Compare commits

..

2 Commits

Author SHA1 Message Date
czlonkowski
11307a9ed2 update privacy policy 2025-11-06 00:19:43 +01:00
czlonkowski
a6ebd1df41 fix: Gracefully handle FTS5 unavailability in sql.js fallback
Fixed critical startup crash when server falls back to sql.js adapter
due to Node.js version mismatches.

Problem:
- better-sqlite3 fails to load when Node runtime version differs from build version
- Server falls back to sql.js (pure JS, no native dependencies)
- Database health check crashed with "no such module: fts5"
- Server exits immediately, preventing Claude Desktop connection

Solution:
- Wrapped FTS5 health check in try-catch block
- Logs warning when FTS5 not available
- Server continues with fallback search (LIKE queries)
- Graceful degradation: works with any Node.js version

Impact:
- Server now starts successfully with sql.js fallback
- Works with Node v20 (Claude Desktop) even when built with Node v22
- Clear warnings about FTS5 unavailability
- Users can choose: sql.js (slower, works everywhere) or rebuild better-sqlite3 (faster)

Files Changed:
- src/mcp/server.ts: Added try-catch around FTS5 health check (lines 299-317)

Testing:
-  Tested with Node v20.17.0 (Claude Desktop)
-  Tested with Node v22.17.0 (build version)
-  All 6 startup checkpoints pass
-  Database health check passes with warning

Fixes: Claude Desktop connection failures with Node.js version mismatches

Conceived by Romuald Członkowski - https://www.aiadvisors.pl/en
2025-11-04 15:54:54 +01:00
69 changed files with 1355 additions and 14009 deletions

View File

@@ -26,8 +26,4 @@ USE_NGINX=false
# N8N_API_URL=https://your-n8n-instance.com
# N8N_API_KEY=your-api-key-here
# N8N_API_TIMEOUT=30000
# N8N_API_MAX_RETRIES=3
# Optional: Disable specific tools (comma-separated list)
# Example: DISABLED_TOOLS=n8n_diagnostic,n8n_health_check
# DISABLED_TOOLS=
# N8N_API_MAX_RETRIES=3

View File

@@ -103,23 +103,6 @@ AUTH_TOKEN=your-secure-token-here
# For local development with local n8n:
# WEBHOOK_SECURITY_MODE=moderate
# Disabled Tools Configuration
# Filter specific tools from registration at startup
# Useful for multi-tenant deployments, security hardening, or feature flags
#
# Format: Comma-separated list of tool names
# Example: DISABLED_TOOLS=n8n_diagnostic,n8n_health_check,custom_tool
#
# Common use cases:
# - Multi-tenant: Hide tools that check env vars instead of instance context
# Example: DISABLED_TOOLS=n8n_diagnostic,n8n_health_check
# - Security: Disable management tools in production for certain users
# - Feature flags: Gradually roll out new tools
# - Deployment-specific: Different tool sets for cloud vs self-hosted
#
# Default: (empty - all tools enabled)
# DISABLED_TOOLS=
# =========================
# MULTI-TENANT CONFIGURATION
# =========================

View File

@@ -1,209 +0,0 @@
# N8N-MCP Validation Analysis: Quick Reference
**Analysis Date**: November 8, 2025 | **Data Period**: 90 days | **Sample Size**: 29,218 events
---
## The Core Finding
**Validation is working perfectly. Guidance is the problem.**
- 29,218 validation events successfully prevented bad deployments
- 100% of agents fix errors same-day (proving feedback works)
- 12.6% error rate for advanced users (who attempt complex workflows)
- High error volume = high usage, not broken system
---
## Top 3 Problem Areas (75% of errors)
| Area | Errors | Root Cause | Quick Fix |
|------|--------|-----------|-----------|
| **Workflow Structure** | 1,268 (26%) | JSON malformation | Better error messages with examples |
| **Connections** | 676 (14%) | Syntax unintuitive | Create connections guide with diagrams |
| **Required Fields** | 378 (8%) | Not marked upfront | Add "⚠️ REQUIRED" to tool responses |
---
## Problem Nodes (By Frequency)
```
Webhook/Trigger ......... 127 failures (40 users)
Slack .................. 73 failures (2 users)
AI Agent ............... 36 failures (20 users)
HTTP Request ........... 31 failures (13 users)
OpenAI ................. 35 failures (8 users)
```
---
## Top 5 Validation Errors
1. **"Duplicate node ID: undefined"** (179)
- Fix: Point to exact location + show example format
2. **"Single-node workflows only valid for webhooks"** (58)
- Fix: Create webhook guide explaining rule
3. **"responseNode requires onError: continueRegularOutput"** (57)
- Fix: Same guide + inline error context
4. **"Required property X cannot be empty"** (25)
- Fix: Mark required fields before validation
5. **"Duplicate node name: undefined"** (61)
- Fix: Related to structural issues, same solution as #1
---
## Success Indicators
**Agents learn from errors**: 100% same-day correction rate
**Validation catches issues**: Prevents bad deployments
**Feedback is clear**: Quick fixes show error messages work
**No systemic failures**: No "unfixable" errors
---
## What Works Well
- Error messages lead to immediate corrections
- Agents retry and succeed same-day
- Validation prevents broken workflows
- 9,021 users actively using system
---
## What Needs Improvement
1. Required fields not marked in tool responses
2. Error messages don't show valid options for enums
3. Workflow structure documentation lacks examples
4. Connection syntax unintuitive/undocumented
5. Some error messages too generic
---
## Implementation Plan
### Phase 1 (2 weeks): Quick Wins
- Enhanced error messages (location + example)
- Required field markers in tools
- Webhook configuration guide
- **Expected Impact**: 25-30% failure reduction
### Phase 2 (2 weeks): Documentation
- Enum value suggestions in validation
- Workflow connections guide
- Error handler configuration guide
- AI Agent validation improvements
- **Expected Impact**: Additional 15-20% reduction
### Phase 3 (2 weeks): Advanced Features
- Improved search with config hints
- Node type fuzzy matching
- KPI tracking setup
- Test coverage
- **Expected Impact**: Additional 10-15% reduction
**Total Impact**: 50-65% failure reduction (target: 6-7% error rate)
---
## Key Metrics
| Metric | Current | Target | Timeline |
|--------|---------|--------|----------|
| Validation failure rate | 12.6% | 6-7% | 6 weeks |
| First-attempt success | ~77% | 85%+ | 6 weeks |
| Retry success | 100% | 100% | N/A |
| Webhook failures | 127 | <30 | Week 2 |
| Connection errors | 676 | <270 | Week 4 |
---
## Files Delivered
1. **VALIDATION_ANALYSIS_REPORT.md** (27KB)
- Complete analysis with 16 SQL queries
- Detailed findings by category
- 8 actionable recommendations
2. **VALIDATION_ANALYSIS_SUMMARY.md** (13KB)
- Executive summary (one-page)
- Key metrics scorecard
- Top recommendations with ROI
3. **IMPLEMENTATION_ROADMAP.md** (4.3KB)
- 6-week implementation plan
- Phase-by-phase breakdown
- Code locations and effort estimates
4. **ANALYSIS_QUICK_REFERENCE.md** (this file)
- Quick lookup reference
- Top problems at a glance
- Decision-making summary
---
## Next Steps
1. **Week 1**: Review analysis + get team approval
2. **Week 2**: Start Phase 1 (error messages + markers)
3. **Week 4**: Deploy Phase 1 + start Phase 2
4. **Week 6**: Deploy Phase 2 + start Phase 3
5. **Week 8**: Deploy Phase 3 + measure impact
6. **Week 9+**: Monitor KPIs + iterate
---
## Key Recommendations Priority
### HIGH (Do First - Week 1-2)
1. Enhance structure error messages
2. Add required field markers to tools
3. Create webhook configuration guide
### MEDIUM (Do Next - Week 3-4)
4. Add enum suggestions to validation responses
5. Create workflow connections guide
6. Add AI Agent node validation
### LOW (Do Later - Week 5-6)
7. Enhance search with config hints
8. Build fuzzy node matcher
9. Setup KPI tracking
---
## Discussion Points
**Q: Why don't we just weaken validation?**
A: Validation prevents 29,218 bad deployments. That's its job. We improve guidance instead.
**Q: Are agents really learning from errors?**
A: Yes, 100% same-day recovery across 661 user-date pairs with errors.
**Q: Why do documentation readers have higher error rates?**
A: They attempt more complex workflows (6.8x more attempts). Success rate is still 87.4%.
**Q: Which node needs the most help?**
A: Webhook/Trigger configuration (127 failures). Most urgent fix.
**Q: Can we hit 50% reduction in 6 weeks?**
A: Yes, analysis shows 50-65% reduction is achievable with these changes.
---
## Contact & Questions
For detailed information:
- Full analysis: `VALIDATION_ANALYSIS_REPORT.md`
- Executive summary: `VALIDATION_ANALYSIS_SUMMARY.md`
- Implementation plan: `IMPLEMENTATION_ROADMAP.md`
---
**Report Status**: Complete and Ready for Action
**Confidence Level**: High (9,021 users, 29,218 events, comprehensive analysis)
**Generated**: November 8, 2025

View File

@@ -7,952 +7,6 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
## [Unreleased]
## [2.23.0] - 2025-11-21
### ✨ Features
**Type Structure Validation System (Phases 1-4 Complete)**
Implemented comprehensive automatic validation system for complex n8n node configuration structures, ensuring workflows are correct before deployment.
#### Overview
Type Structure Validation is an automatic, zero-configuration validation system that validates complex node configurations (filter, resourceMapper, assignmentCollection, resourceLocator) during node validation. The system operates transparently - no special flags or configuration required.
#### Key Features
**1. Automatic Structure Validation**
- Validates 4 special n8n types: filter, resourceMapper, assignmentCollection, resourceLocator
- Zero configuration required - works automatically in all validation tools
- Integrated in `validate_node_operation` and `validate_node_minimal` tools
- 100% backward compatible - no breaking changes
**2. Comprehensive Type Coverage**
- **filter** (FilterValue) - Complex filtering conditions with 40+ operations (equals, contains, regex, etc.)
- **resourceMapper** (ResourceMapperValue) - Data mapping configuration for format transformation
- **assignmentCollection** (AssignmentCollectionValue) - Variable assignments for setting multiple values
- **resourceLocator** (INodeParameterResourceLocator) - Resource selection with multiple lookup modes (ID, name, URL)
**3. Production-Ready Performance**
- **100% pass rate** on 776 real-world validations (91 templates, 616 nodes)
- **0.01ms average** validation time (500x faster than 50ms target)
- **0% false positive rate**
- Tested against top n8n.io workflow templates
**4. Clear Error Messages**
- Actionable error messages with property paths
- Fix suggestions for common issues
- Context-aware validation with node-specific logic
- Educational feedback for AI agents
#### Implementation Phases
**Phase 1: Type Structure Definitions**
- 22 complete type structures defined in `src/constants/type-structures.ts` (741 lines)
- Type definitions in `src/types/type-structures.ts` (301 lines)
- Complete coverage of filter, resourceMapper, assignmentCollection, resourceLocator
- TypeScript interfaces with validation schemas
**Phase 2: Validation Integration**
- Integrated in `EnhancedConfigValidator` service (427 lines)
- Automatic validation in all MCP tools (validate_node_operation, validate_node_minimal)
- Four validation profiles: minimal, runtime, ai-friendly, strict
- Node-specific validation logic for edge cases
**Phase 3: Real-World Validation**
- 100% pass rate on 776 validations across 91 templates
- 616 nodes tested from top n8n.io workflows
- Type-specific results:
- filter: 93/93 passed (100.00%)
- resourceMapper: 69/69 passed (100.00%)
- assignmentCollection: 213/213 passed (100.00%)
- resourceLocator: 401/401 passed (100.00%)
- Performance: 0.01ms average (500x better than target)
**Phase 4: Documentation & Polish**
- Comprehensive technical documentation (`docs/TYPE_STRUCTURE_VALIDATION.md`)
- Updated internal documentation (CLAUDE.md)
- Progressive discovery maintained (minimal tool documentation changes)
- Production readiness checklist completed
#### Edge Cases Handled
**1. Credential-Provided Fields**
- Fields like Google Sheets `sheetId` that come from credentials at runtime
- No false positives for credential-populated fields
**2. Filter Operations**
- Universal operations (exists, notExists, isNotEmpty) work across all data types
- Type-specific operations validated (regex for strings, gt/lt for numbers)
**3. Node-Specific Logic**
- Custom validation for specific nodes (Google Sheets, Slack, etc.)
- Context-aware error messages based on node operation
#### Technical Details
**Files Added:**
- `src/types/type-structures.ts` (301 lines) - Type definitions
- `src/constants/type-structures.ts` (741 lines) - 22 complete type structures
- `src/services/type-structure-service.ts` (427 lines) - Validation service
- `docs/TYPE_STRUCTURE_VALIDATION.md` (239 lines) - Technical documentation
**Files Modified:**
- `src/services/enhanced-config-validator.ts` - Integrated structure validation
- `src/mcp/tools-documentation.ts` - Minimal progressive discovery notes
- `CLAUDE.md` - Updated architecture and Phase 1-3 completion
**Test Coverage:**
- `tests/unit/types/type-structures.test.ts` (14 tests)
- `tests/unit/constants/type-structures.test.ts` (39 tests)
- `tests/unit/services/type-structure-service.test.ts` (64 tests)
- `tests/unit/services/enhanced-config-validator-type-structures.test.ts` (comprehensive)
- `tests/integration/validation/real-world-structure-validation.test.ts` (8 tests, 388ms)
- `scripts/test-structure-validation.ts` - Standalone validation script
#### Usage
No changes required - structure validation works automatically:
```javascript
// Validation works automatically with structure validation
validate_node_operation("nodes-base.if", {
conditions: {
combinator: "and",
conditions: [{
leftValue: "={{ $json.status }}",
rightValue: "active",
operator: { type: "string", operation: "equals" }
}]
}
})
// Structure errors are caught and reported clearly
// Invalid operation → Clear error with valid operations list
// Missing required fields → Actionable fix suggestions
```
#### Benefits
**For Users:**
- ✅ Prevents configuration errors before deployment
- ✅ Clear, actionable error messages
- ✅ Faster workflow development with immediate feedback
- ✅ Confidence in workflow correctness
**For AI Agents:**
- ✅ Better understanding of complex n8n types
- ✅ Self-correction based on clear error messages
- ✅ Reduced validation errors and retry loops
- ✅ Educational feedback for learning n8n patterns
**Technical:**
- ✅ Zero breaking changes (100% backward compatible)
- ✅ Automatic integration (no configuration needed)
- ✅ High performance (0.01ms average)
- ✅ Production-ready (100% pass rate on real workflows)
#### Documentation
**User Documentation:**
- `docs/TYPE_STRUCTURE_VALIDATION.md` - Complete technical reference
- Includes: Overview, supported types, performance metrics, examples, developer guide
**Internal Documentation:**
- `CLAUDE.md` - Architecture updates and Phase 1-3 results
- `src/mcp/tools-documentation.ts` - Progressive discovery notes
**Implementation Details:**
- `docs/local/v3/implementation-plan-final.md` - Complete technical specifications
- All 4 phases documented with success criteria and results
#### Version History
- **v2.23.0** (2025-11-21): Type structure validation system completed (Phases 1-4)
- Phase 1: 22 complete type structures defined
- Phase 2: Validation integrated in all MCP tools
- Phase 3: 100% pass rate on 776 real-world validations
- Phase 4: Documentation and polish completed
- Zero false positives, 0.01ms average validation time
Conceived by Romuald Członkowski - https://www.aiadvisors.pl/en
## [2.22.21] - 2025-11-20
### 🐛 Bug Fixes
**Fix Empty Settings Object Validation Error (#431)**
Fixed critical bug where `n8n_update_partial_workflow` tool failed with "request/body must NOT have additional properties" error when workflows had no settings or only non-whitelisted settings properties.
#### Root Cause
- `cleanWorkflowForUpdate()` in `src/services/n8n-validation.ts` was sending empty `settings: {}` objects to the n8n API
- n8n API rejects empty settings objects as "additional properties" violation
- Issue occurred when:
- Workflow had no settings property
- Workflow had only non-whitelisted settings (e.g., only `callerPolicy`)
#### Changes
- **Primary Fix**: Modified `cleanWorkflowForUpdate()` to delete `settings` property when empty after filtering
- Instead of sending `settings: {}`, the property is now omitted entirely
- Added safeguards in lines 193-199 and 201-204
- **Secondary Fix**: Enhanced `applyUpdateSettings()` in `workflow-diff-engine.ts` to prevent creating empty settings objects
- Only creates/updates settings if operation provides actual properties
- **Test Updates**: Fixed 3 incorrect tests that expected empty settings objects
- Updated to expect settings property to be omitted instead
- Added 2 new comprehensive tests for edge cases
#### Testing
- All 75 unit tests in `n8n-validation.test.ts` passing
- New tests cover:
- Workflows with no settings → omits property
- Workflows with only non-whitelisted settings → omits property
- Workflows with mixed settings → keeps only whitelisted properties
**Related Issues**: #431, #248 (n8n API design limitation)
**Related n8n Issue**: n8n-io/n8n#19587 (closed as NOT_PLANNED - MCP server issue)
Conceived by Romuald Członkowski - https://www.aiadvisors.pl/en
## [2.22.20] - 2025-11-19
### 🔄 Dependencies
**n8n Update to 1.120.3**
Updated all n8n-related dependencies to their latest versions:
- n8n: 1.119.1 → 1.120.3
- n8n-core: 1.118.0 → 1.119.2
- n8n-workflow: 1.116.0 → 1.117.0
- @n8n/n8n-nodes-langchain: 1.118.0 → 1.119.1
- Rebuilt node database with 544 nodes (439 from n8n-nodes-base, 105 from @n8n/n8n-nodes-langchain)
Conceived by Romuald Członkowski - https://www.aiadvisors.pl/en
## [2.22.18] - 2025-11-14
### ✨ Features
**Structural Hash Tracking for Workflow Mutations**
Added structural hash tracking to enable cross-referencing between workflow mutations and workflow quality data:
#### Structural Hash Generation
- Added `workflowStructureHashBefore` and `workflowStructureHashAfter` fields to mutation records
- Hashes based on node types + connections (structural elements only)
- Compatible with `telemetry_workflows.workflow_hash` format for cross-referencing
- Implementation: Uses `WorkflowSanitizer.generateWorkflowHash()` for consistency
- Enables linking mutation impact to workflow quality scores and grades
#### Success Tracking Enhancement
- Added `isTrulySuccessful` computed field to mutation records
- Definition: Mutation executed successfully AND improved/maintained validation AND has known intent
- Enables filtering to high-quality mutation data
- Provides automated success detection without manual review
#### Testing & Verification
- All 17 mutation-tracker unit tests passing
- Verified with live mutations: structural changes detected (hash changes), config-only updates detected (hash stays same)
- Success tracking working accurately (64% truly successful rate in testing)
**Files Modified**:
- `src/telemetry/mutation-tracker.ts`: Generate structural hashes during mutation processing
- `src/telemetry/mutation-types.ts`: Add new fields to WorkflowMutationRecord interface
- `src/telemetry/workflow-sanitizer.ts`: Expose generateWorkflowHash() method
- `tests/unit/telemetry/mutation-tracker.test.ts`: Add 5 new test cases
**Impact**:
- Enables cross-referencing between mutation and workflow data
- Provides labeled dataset with quality indicators
- Maintains backward compatibility (new fields optional)
Conceived by Romuald Członkowski - https://www.aiadvisors.pl/en
## [2.22.17] - 2025-11-13
### 🐛 Bug Fixes
**Critical Telemetry Improvements**
Fixed three critical issues in workflow mutation telemetry to improve data quality and security:
#### 1. Fixed Inconsistent Sanitization (Security Critical)
- **Problem**: 30% of workflows (178-188 records) were unsanitized, exposing potential credentials/tokens
- **Solution**: Replaced weak inline sanitization with robust `WorkflowSanitizer.sanitizeWorkflowRaw()`
- **Impact**: Now 100% sanitization coverage with 17 sensitive patterns detected and redacted
- **Files Modified**:
- `src/telemetry/workflow-sanitizer.ts`: Added `sanitizeWorkflowRaw()` method
- `src/telemetry/mutation-tracker.ts`: Removed redundant sanitization code, use centralized sanitizer
#### 2. Enabled Validation Data Capture (Data Quality Blocker)
- **Problem**: Zero validation metrics captured (validation_before/after all NULL)
- **Solution**: Added workflow validation before and after mutations using `WorkflowValidator`
- **Impact**: Can now measure mutation quality, track error resolution patterns
- **Implementation**:
- Validates workflows before mutation (captures baseline errors)
- Validates workflows after mutation (measures improvement)
- Non-blocking: validation errors don't prevent mutations
- Captures: errors, warnings, validation status
- **Files Modified**:
- `src/mcp/handlers-workflow-diff.ts`: Added pre/post mutation validation
#### 3. Improved Intent Capture (Data Quality)
- **Problem**: 92.62% of intents were generic "Partial workflow update"
- **Solution**: Enhanced tool documentation + automatic intent inference from operations
- **Impact**: Meaningful intents automatically generated when not explicitly provided
- **Implementation**:
- Enhanced documentation with specific intent examples and anti-patterns
- Added `inferIntentFromOperations()` function that generates meaningful intents:
- Single operations: "Add n8n-nodes-base.slack", "Connect webhook to HTTP Request"
- Multiple operations: "Workflow update: add 2 nodes, modify connections"
- Fallback inference when intent is missing, generic, or too short
- **Files Modified**:
- `src/mcp/tool-docs/workflow_management/n8n-update-partial-workflow.ts`: Enhanced guidance
- `src/mcp/handlers-workflow-diff.ts`: Added intent inference logic
### 📊 Expected Results
After deployment, telemetry data should show:
- **100% sanitization coverage** (up from 70%)
- **100% validation capture** (up from 0%)
- **50%+ meaningful intents** (up from 7.33%)
- **Complete telemetry dataset** for analysis
### 🎯 Technical Details
**Sanitization Coverage**: Now detects and redacts:
- Webhook URLs, API keys (OpenAI sk-*, GitHub ghp-*, etc.)
- Bearer tokens, OAuth credentials, passwords
- URLs with authentication, long tokens (20+ chars)
- Sensitive field names (apiKey, token, secret, password, etc.)
**Validation Metrics Captured**:
- Workflow validity status (true/false)
- Error/warning counts and details
- Node configuration errors
- Connection errors
- Expression syntax errors
- Validation improvement tracking (errors resolved/introduced)
**Intent Inference Examples**:
- `addNode` → "Add n8n-nodes-base.webhook"
- `rewireConnection` → "Rewire IF from ErrorHandler to SuccessHandler"
- Multiple operations → "Workflow update: add 2 nodes, modify connections, update metadata"
## [2.22.16] - 2025-11-13
### ✨ Enhanced Features
**Workflow Mutation Telemetry for AI-Powered Workflow Assistance**
Added comprehensive telemetry tracking for workflow mutations to enable more context-aware and intelligent responses when users modify their n8n workflows. The AI can better understand user intent and provide more relevant suggestions.
#### Key Improvements
1. **Intent Parameter for Better Context**
- Added `intent` parameter to `n8n_update_full_workflow` and `n8n_update_partial_workflow` tools
- Captures user's goals and reasoning behind workflow changes
- Example: "Add error handling for API failures" or "Migrate to new node versions"
- Helps AI provide more relevant and context-aware responses
2. **Comprehensive Data Sanitization**
- Multi-layer sanitization at workflow, node, and parameter levels
- Removes credentials, API keys, tokens, and sensitive data
- Redacts URLs with authentication, long tokens (32+ chars), OpenAI-style keys
- Ensures telemetry data is safe while preserving structural patterns
3. **Improved Auto-Flush Performance**
- Reduced mutation auto-flush threshold from 5 to 2 events
- Provides faster feedback and reduces data loss risk
- Balances database write efficiency with responsiveness
4. **Enhanced Mutation Tracking**
- Tracks before/after workflow states with secure hashing
- Captures intent classification, operation types, and change metrics
- Records validation improvements (errors resolved/introduced)
- Monitors success rates, errors, and operation duration
#### Technical Changes
**Modified Files:**
- `src/telemetry/mutation-tracker.ts`: Added comprehensive sanitization methods
- `src/telemetry/telemetry-manager.ts`: Reduced auto-flush threshold, improved error logging
- `src/mcp/handlers-workflow-diff.ts`: Added telemetry tracking integration
- `src/mcp/tool-docs/workflow_management/n8n-update-full-workflow.ts`: Added intent parameter documentation
- `src/mcp/tool-docs/workflow_management/n8n-update-partial-workflow.ts`: Added intent parameter documentation
**New Test Files:**
- `tests/unit/telemetry/mutation-tracker.test.ts`: 13 comprehensive sanitization tests
- `tests/unit/telemetry/mutation-validator.test.ts`: 22 validation tests
**Test Coverage:**
- Added 35 new unit tests for mutation tracking and validation
- All 357 telemetry-related tests passing
- Coverage includes sanitization, validation, intent classification, and auto-flush behavior
#### Impact
Users will experience more helpful and context-aware AI responses when working with workflows. The AI can better understand:
- What changes the user is trying to make
- Why certain operations succeed or fail
- Common patterns and best practices
- How to suggest relevant improvements
This feature is completely privacy-focused with comprehensive sanitization to protect sensitive data while capturing the structural patterns needed for better AI assistance.
## [2.22.15] - 2025-11-11
### 🔄 Dependencies
Updated n8n and all related dependencies to the latest versions:
- Updated n8n from 1.118.1 to 1.119.1
- Updated n8n-core from 1.117.0 to 1.118.0
- Updated n8n-workflow from 1.115.0 to 1.116.0
- Updated @n8n/n8n-nodes-langchain from 1.117.0 to 1.118.0
- Rebuilt node database with 543 nodes (439 from n8n-nodes-base, 104 from @n8n/n8n-nodes-langchain)
## [2.22.14] - 2025-01-09
### ✨ New Features
**Issue #410: DISABLED_TOOLS Environment Variable for Tool Filtering**
Added `DISABLED_TOOLS` environment variable to filter specific tools from registration at startup, enabling deployment-specific tool configuration for multi-tenant deployments, security hardening, and feature flags.
#### Problem
In multi-tenant deployments, some tools don't work correctly because they check global environment variables instead of per-instance context. Examples:
- `n8n_diagnostic` shows global env vars (`NODE_ENV`, `process.env.N8N_API_URL`) which are meaningless in multi-tenant mode where each user has their own n8n instance credentials
- `n8n_health_check` checks global n8n API configuration instead of instance-specific settings
- These tools appear in the tools list but either don't work correctly (show wrong data), hang/error, or create confusing UX
Additionally, some deployments need to disable certain tools for:
- **Security**: Disable management tools in production for certain users
- **Feature flags**: Gradually roll out new tools
- **Deployment-specific**: Different tool sets for cloud vs self-hosted
#### Solution
**Environment Variable Format:**
```bash
DISABLED_TOOLS=n8n_diagnostic,n8n_health_check,custom_tool
```
**Implementation:**
1. **`getDisabledTools()` Method** (`src/mcp/server.ts` lines 326-348)
- Parses comma-separated tool names from `DISABLED_TOOLS` env var
- Returns `Set<string>` for O(1) lookup performance
- Handles whitespace trimming and empty entries
- Logs configured disabled tools for debugging
2. **ListToolsRequestSchema Handler** (`src/mcp/server.ts` lines 401-449)
- Filters both `n8nDocumentationToolsFinal` and `n8nManagementTools` arrays
- Removes disabled tools before returning to client
- Logs filtered tool count for observability
3. **CallToolRequestSchema Handler** (`src/mcp/server.ts` lines 491-505)
- Checks if requested tool is disabled before execution
- Returns clear error message with `TOOL_DISABLED` code
- Includes list of all disabled tools in error response
4. **executeTool() Guard** (`src/mcp/server.ts` lines 909-913)
- Defense in depth: additional check at execution layer
- Throws error if disabled tool somehow reaches execution
- Ensures complete protection against disabled tool calls
**Error Response Format:**
```json
{
"error": "TOOL_DISABLED",
"message": "Tool 'n8n_diagnostic' is not available in this deployment. It has been disabled via DISABLED_TOOLS environment variable.",
"disabledTools": ["n8n_diagnostic", "n8n_health_check"]
}
```
#### Usage Examples
**Multi-tenant deployment:**
```bash
# Hide tools that check global env vars
DISABLED_TOOLS=n8n_diagnostic,n8n_health_check
```
**Security hardening:**
```bash
# Disable destructive management tools
DISABLED_TOOLS=n8n_delete_workflow,n8n_update_full_workflow
```
**Feature flags:**
```bash
# Gradually roll out experimental tools
DISABLED_TOOLS=experimental_feature_1,beta_tool_2
```
**Deployment-specific:**
```bash
# Different tool sets for cloud vs self-hosted
DISABLED_TOOLS=local_only_tool,debug_tool
```
#### Benefits
-**Clean Implementation**: ~40 lines of code, simple and maintainable
-**Environment Variable Based**: Standard configuration pattern
-**Backward Compatible**: No `DISABLED_TOOLS` = all tools enabled
-**Defense in Depth**: Filtering at registration + runtime rejection
-**Performance**: O(1) lookup using Set data structure
-**Observability**: Logs configuration and filter counts
-**Clear Error Messages**: Users understand why tools aren't available
#### Test Coverage
**45 comprehensive tests (all passing):**
**Original Tests (21 scenarios):**
- Environment variable parsing (8 tests)
- Tool filtering for both doc & mgmt tools (5 tests)
- ExecuteTool guard (3 tests)
- Invalid tool names (2 tests)
- Real-world use cases (3 tests)
**Additional Tests by test-automator (24 scenarios):**
- Error response structure validation (3 tests)
- Multi-tenant mode interaction (3 tests)
- Special characters & unicode (5 tests)
- Performance at scale (3 tests)
- Environment variable edge cases (4 tests)
- Defense in depth verification (3 tests)
- Real-world deployment scenarios (3 tests)
**Coverage:** 95% of feature code, exceeds >90% requirement
#### Files Modified
**Core Implementation (1 file):**
- `src/mcp/server.ts` - Added filtering logic (~40 lines)
**Configuration (4 files):**
- `.env.example` - Added `DISABLED_TOOLS` documentation with examples
- `.env.docker` - Added `DISABLED_TOOLS` example
- `package.json` - Version bump to 2.22.14
- `package.runtime.json` - Version bump to 2.22.14
**Tests (2 files):**
- `tests/unit/mcp/disabled-tools.test.ts` - 21 comprehensive test scenarios
- `tests/unit/mcp/disabled-tools-additional.test.ts` - 24 additional test scenarios
**Documentation (2 files):**
- `DISABLED_TOOLS_TEST_COVERAGE_ANALYSIS.md` - Detailed coverage analysis
- `DISABLED_TOOLS_TEST_SUMMARY.md` - Executive summary
#### Impact
**Before:**
- ❌ Multi-tenant deployments showed incorrect diagnostic information
- ❌ No way to disable problematic tools at deployment level
- ❌ All-or-nothing approach (either all tools or no tools)
**After:**
- ✅ Fine-grained control over available tools per deployment
- ✅ Multi-tenant deployments can hide env-var-based tools
- ✅ Security hardening via tool filtering
- ✅ Feature flag support for gradual rollout
- ✅ Clean, simple configuration via environment variable
#### Technical Details
**Performance:**
- O(1) lookup performance using `Set<string>`
- Tested with 1000 tools: filtering completes in <100ms
- No runtime overhead for tool execution
**Security:**
- Defense in depth: filtering + runtime rejection
- Clear error messages prevent information leakage
- No way to bypass disabled tool restrictions
**Compatibility:**
- 100% backward compatible
- No breaking changes
- Easy rollback (unset environment variable)
Resolves #410
Conceived by Romuald Członkowski - [www.aiadvisors.pl/en](https://www.aiadvisors.pl/en)
## [2.22.13] - 2025-01-08
### 🎯 Improvements
**Telemetry-Driven Quick Wins: Reducing AI Agent Validation Errors by 30-40%**
Based on comprehensive telemetry analysis of 593 validation errors across 4,000+ workflows, implemented three focused improvements to reduce AI agent configuration errors.
#### Problem
Telemetry analysis revealed that while validation works correctly (100% error recovery rate), AI agents struggle with three specific areas:
1. **378 errors** (64% of failures): Missing required fields because agents didn't call `get_node_essentials()` first
2. **179 errors** (30% of failures): Unhelpful "Duplicate node ID: undefined" messages lacking context
3. **36 errors** (6% of failures): AI Agent node configuration issues without guidance
**Root Cause**: Documentation and error message gaps, not validation logic failures.
#### Solution
**1. Enhanced Tools Documentation** (`src/mcp/tools-documentation.ts` lines 86-113):
- Added prominent warning: "⚠ CRITICAL: Always call get_node_essentials() FIRST"
- Emphasized get_node_essentials with checkmarks and "CALL THIS FIRST" label
- Repositioned get_node_info as secondary option
- Highlighted that essentials shows required fields
**Impact**: Prevents 378 required field errors (64% reduction)
**2. Improved Duplicate ID Error Messages** (`src/services/workflow-validator.ts` lines 297-320):
- Enhanced error to include:
- Node indices (positions in array)
- Both node names and types for conflicting nodes
- Clear instruction to use `crypto.randomUUID()`
- Working code example showing correct pattern
- Added node index tracking with `nodeIdToIndex` map
**Before**:
```
Duplicate node ID: "undefined"
```
**After**:
```
Duplicate node ID: "abc123". Node at index 1 (name: "Second Node", type: "n8n-nodes-base.set")
conflicts with node at index 0 (name: "First Node", type: "n8n-nodes-base.httpRequest").
Each node must have a unique ID. Generate a new UUID using crypto.randomUUID() - Example:
{id: "550e8400-e29b-41d4-a716-446655440000", name: "Second Node", type: "n8n-nodes-base.set", ...}
```
**Impact**: Fixes 179 "duplicate ID: undefined" errors (30% reduction)
**3. AI Agent Node-Specific Validator** (`src/services/node-specific-validators.ts` after line 662):
- Validates promptType and text requirement (promptType: "define" requires text)
- Checks system message presence and quality (warns if < 20 characters)
- Warns about output parser and fallback model connections
- Validates maxIterations (must be positive, warns if > 50)
- Suggests error handling with AI-appropriate retry timings (5000ms for rate limits)
- Checks for deprecated continueOnFail
**Integration**: Added AI Agent to enhanced-config-validator.ts switch statement
**Impact**: Fixes 36 AI Agent configuration errors (6% reduction)
#### Changes Summary
**Files Modified (4 files)**:
- `src/mcp/tools-documentation.ts` - Enhanced workflow pattern documentation (27 lines)
- `src/services/workflow-validator.ts` - Improved duplicate ID errors (23 lines + import)
- `src/services/node-specific-validators.ts` - Added AI Agent validator (90 lines)
- `src/services/enhanced-config-validator.ts` - AI Agent integration (3 lines)
**Test Files (2 files)**:
- `tests/unit/services/workflow-validator.test.ts` - Duplicate ID tests (56 lines)
- `tests/unit/services/node-specific-validators.test.ts` - AI Agent validator tests (181 lines)
**Configuration (2 files)**:
- `package.json` - Version bump to 2.22.13
- `package.runtime.json` - Version bump to 2.22.13
#### Testing Results
**Test Coverage**: All tests passing
- Workflow validator: Duplicate ID detection with context
- Node-specific validators: AI Agent prompt, system message, maxIterations, error handling
- Integration: Enhanced-config-validator switch statement
**Patterns Followed**:
- Duplicate ID enhancement: Matches Issue #392 parameter validation pattern
- AI Agent validator: Follows Slack validator pattern (lines 22-89)
- Error messages: Consistent with existing validation errors
#### Expected Impact
**For AI Agents**:
-**Clear Guidance**: Documentation emphasizes calling essentials first
-**Better Error Messages**: Duplicate ID errors include node context and UUID examples
-**AI Agent Support**: Comprehensive validation for common configuration issues
-**Self-Correction**: AI agents can fix issues based on improved error messages
**Projected Error Reduction**:
- Required field errors: -64% (378 → ~136 errors)
- Duplicate ID errors: -30% (179 → ~125 errors)
- AI Agent errors: -6% (36 → ~0 errors)
- **Total reduction: 30-40% of validation errors**
**Production Impact**:
- **Risk Level**: Very Low (documentation + error messages only)
- **Breaking Changes**: None (backward compatible)
- **Performance**: No impact (O(n) complexity unchanged)
- **False Positive Rate**: 0% (no new validation logic)
#### Technical Details
**Implementation Time**: ~1 hour total
- Quick Win #1 (Documentation): 10 minutes
- Quick Win #2 (Duplicate IDs): 20 minutes
- Quick Win #3 (AI Agent): 30 minutes
**Dependencies**:
- Node.js 22.17.0 (crypto.randomUUID() available since 14.17.0)
- No new package dependencies
**Validation Profiles**: All changes compatible with existing profiles (minimal, runtime, ai-friendly, strict)
#### References
- **Telemetry Analysis**: 593 errors across 4,000+ workflows analyzed
- **Error Recovery Rate**: 100% (validation working correctly)
- **Root Cause**: Documentation/guidance gaps, not validation failures
- **Pattern Source**: Issue #392 (parameter validation), Slack validator (node-specific validation)
Conceived by Romuald Członkowski - [www.aiadvisors.pl/en](https://www.aiadvisors.pl/en)
### 🐛 Bug Fixes
**Critical: AI Agent Validator Not Executing**
Fixed nodeType format mismatch bug that prevented the AI Agent validator (Quick Win #3 above) from ever executing.
**The Bug**: Switch case checked for `@n8n/n8n-nodes-langchain.agent` but nodeType was normalized to `nodes-langchain.agent` first, so validator never matched.
**Fix**: Changed `enhanced-config-validator.ts:322` from `case '@n8n/n8n-nodes-langchain.agent':` to `case 'nodes-langchain.agent':`
**Impact**: Without this fix, the AI Agent validator code from Quick Win #3 would never execute, missing 179 configuration errors (30% of failures).
**Testing**: Added verification test in `enhanced-config-validator.test.ts:1137-1169` to ensure validator executes.
**Discovery**: Found by n8n-mcp-tester agent during post-deployment verification of Quick Win #3.
## [2.22.12] - 2025-01-08
### 🐛 Bug Fixes
**Issue #392: Helpful Error Messages for "changes" vs "updates" Parameter**
Fixed cryptic error message when users mistakenly use `changes` instead of `updates` in updateNode operations. AI agents now receive clear, educational error messages that help them self-correct immediately.
#### Problem
Users who mistakenly used `changes` instead of `updates` in `n8n_update_partial_workflow` updateNode operations encountered a cryptic error:
```
Diff engine error: Cannot read properties of undefined (reading 'name')
```
This error occurred because:
1. The code tried to read `operation.updates.name` at line 406 of `workflow-diff-engine.ts`
2. When users sent `changes` instead of `updates`, `operation.updates` was `undefined`
3. Reading `.name` from `undefined` → unhelpful error message
4. AI agents had no guidance on what went wrong or how to fix it
**Root Cause**: No early validation to detect this common parameter mistake before attempting to access properties.
#### Solution
Added early validation in `validateUpdateNode()` method to detect and provide helpful guidance:
**1. Parameter Validation** (`src/services/workflow-diff-engine.ts` lines 400-409):
```typescript
// Check for common parameter mistake: "changes" instead of "updates" (Issue #392)
const operationAny = operation as any;
if (operationAny.changes && !operation.updates) {
return `Invalid parameter 'changes'. The updateNode operation requires 'updates' (not 'changes'). Example: {type: "updateNode", nodeId: "abc", updates: {name: "New Name", "parameters.url": "https://example.com"}}`;
}
// Check for missing required parameter
if (!operation.updates) {
return `Missing required parameter 'updates'. The updateNode operation requires an 'updates' object containing properties to modify. Example: {type: "updateNode", nodeId: "abc", updates: {name: "New Name"}}`;
}
```
**2. Documentation Fix** (`docs/VS_CODE_PROJECT_SETUP.md` line 165):
- Fixed outdated example that showed incorrect parameter name
- Changed from: `{type: 'updateNode', nodeId: 'slack1', changes: {position: [100, 200]}}`
- Changed to: `{type: 'updateNode', nodeId: 'slack1', updates: {position: [100, 200]}}`
- Prevents AI agents from learning the wrong syntax
**3. Comprehensive Test Coverage** (`tests/unit/services/workflow-diff-engine.test.ts` lines 388-428):
- Test for using `changes` instead of `updates` (validates helpful error message)
- Test for missing `updates` parameter entirely
- Both tests verify error message content includes examples
#### Error Messages
**Before Fix:**
```
Diff engine error: Cannot read properties of undefined (reading 'name')
```
**After Fix:**
```
Missing required parameter 'updates'. The updateNode operation requires an 'updates'
object containing properties to modify. Example: {type: "updateNode", nodeId: "abc",
updates: {name: "New Name"}}
```
#### Impact
**For AI Agents:**
-**Clear Error Messages**: Explicitly states what's wrong ("Invalid parameter 'changes'")
-**Educational**: Explains the correct parameter name ("requires 'updates'")
-**Actionable**: Includes working example showing correct syntax
-**Self-Correction**: AI agents can immediately fix their code based on the error
**Testing Results:**
- Test Coverage: 85% confidence (production ready)
- n8n-mcp-tester validation: All 3 test cases passed
- Code Review: Approved with minor optional suggestions
- Consistency: Follows existing patterns from Issue #249
**Production Impact:**
- **Risk Level**: Very Low (only adds validation, no logic changes)
- **Breaking Changes**: None (backward compatible)
- **False Positive Rate**: 0% (validation is specific to the exact mistake)
#### Technical Details
**Files Modified (3 files):**
- `src/services/workflow-diff-engine.ts` - Added early validation (10 lines)
- `docs/VS_CODE_PROJECT_SETUP.md` - Fixed incorrect example (1 line)
- `tests/unit/services/workflow-diff-engine.test.ts` - Added 2 comprehensive test cases (40 lines)
**Configuration (1 file):**
- `package.json` - Version bump to 2.22.12
**Validation Flow:**
1. Check if operation has `changes` property but no `updates` → Error with helpful message
2. Check if operation is missing `updates` entirely → Error with example
3. Continue with normal validation if `updates` is present
**Consistency:**
- Pattern matches existing parameter validation in `validateAddConnection()` (lines 444-451)
- Error message format consistent with existing errors (lines 461, 466, 469)
- Uses same `as any` approach for detecting invalid properties
#### References
- **Issue**: #392 - "Diff engine error: Cannot read properties of undefined (reading 'name')"
- **Reporter**: User Aldekein (via cmj-hub investigation)
- **Test Coverage Assessment**: 85% confidence - SUFFICIENT for production
- **Code Review**: APPROVE WITH COMMENTS - Well-implemented and ready to merge
- **Related Issues**: None (this is a new validation feature)
Conceived by Romuald Członkowski - [www.aiadvisors.pl/en](https://www.aiadvisors.pl/en)
## [2.22.11] - 2025-01-06
### ✨ New Features
**Issue #399: Workflow Activation via Diff Operations**
Added workflow activation and deactivation as diff operations in `n8n_update_partial_workflow`, using n8n's dedicated API endpoints.
#### Problem
The n8n API provides dedicated `POST /workflows/{id}/activate` and `POST /workflows/{id}/deactivate` endpoints, but these were not accessible through n8n-mcp. Users could not programmatically control workflow activation status, forcing manual activation through the n8n UI.
#### Solution
Implemented activation/deactivation as diff operations, following the established pattern of metadata operations like `updateSettings` and `updateName`. This keeps the tool count manageable (40 tools, not 42) and provides a consistent interface.
#### Changes
**API Client** (`src/services/n8n-api-client.ts`):
- Added `activateWorkflow(id: string): Promise<Workflow>` method
- Added `deactivateWorkflow(id: string): Promise<Workflow>` method
- Both use POST requests to dedicated n8n API endpoints
**Diff Engine Types** (`src/types/workflow-diff.ts`):
- Added `ActivateWorkflowOperation` interface
- Added `DeactivateWorkflowOperation` interface
- Added `shouldActivate` and `shouldDeactivate` flags to `WorkflowDiffResult`
- Increased supported operations from 15 to 17
**Diff Engine** (`src/services/workflow-diff-engine.ts`):
- Added validation for activation (requires activatable triggers)
- Added operation application logic
- Transfers activation intent from workflow object to result
- Validates workflow has activatable triggers (webhook, schedule, etc.)
- Rejects workflows with only `executeWorkflowTrigger` (cannot activate)
**Handler** (`src/mcp/handlers-workflow-diff.ts`):
- Checks `shouldActivate` and `shouldDeactivate` flags after workflow update
- Calls appropriate API methods
- Includes activation status in response message and details
- Handles activation/deactivation errors gracefully
**Documentation** (`src/mcp/tool-docs/workflow_management/n8n-update-partial-workflow.ts`):
- Updated operation count from 15 to 17
- Added "Workflow Activation Operations" section
- Added activation tip to essentials
**Tool Registration** (`src/mcp/handlers-n8n-manager.ts`):
- Removed "Cannot activate/deactivate workflows via API" from limitations
#### Usage
```javascript
// Activate workflow
n8n_update_partial_workflow({
id: "workflow_id",
operations: [{
type: "activateWorkflow"
}]
})
// Deactivate workflow
n8n_update_partial_workflow({
id: "workflow_id",
operations: [{
type: "deactivateWorkflow"
}]
})
// Combine with other operations
n8n_update_partial_workflow({
id: "workflow_id",
operations: [
{type: "updateNode", nodeId: "abc", updates: {name: "Updated"}},
{type: "activateWorkflow"}
]
})
```
#### Validation
- **Activation**: Requires at least one enabled activatable trigger node
- **Deactivation**: Always valid
- **Error Handling**: Clear messages when activation fails due to missing triggers
- **Trigger Detection**: Uses `isActivatableTrigger()` utility (Issue #351 compliance)
#### Benefits
- ✅ Consistent with existing architecture (metadata operations pattern)
- ✅ Keeps tool count at 40 (not 42)
- ✅ Atomic operations - activation happens after workflow update
- ✅ Proper validation - prevents activation without triggers
- ✅ Clear error messages - guides users on trigger requirements
- ✅ Works with other operations - can update and activate in one call
#### Credits
- **@ArtemisAI** - Original investigation and API endpoint discovery
- **@cmj-hub** - Implementation attempt and PR contribution
- Architectural guidance from project maintainer
Resolves #399
Conceived by Romuald Członkowski - [www.aiadvisors.pl/en](https://www.aiadvisors.pl/en)
## [2.22.10] - 2025-11-04
### 🐛 Bug Fixes

View File

@@ -28,13 +28,8 @@ src/
│ ├── enhanced-config-validator.ts # Operation-aware validation (NEW in v2.4.2)
│ ├── node-specific-validators.ts # Node-specific validation logic (NEW in v2.4.2)
│ ├── property-dependencies.ts # Dependency analysis (NEW in v2.4)
│ ├── type-structure-service.ts # Type structure validation (NEW in v2.22.21)
│ ├── expression-validator.ts # n8n expression syntax validation (NEW in v2.5.0)
│ └── workflow-validator.ts # Complete workflow validation (NEW in v2.5.0)
├── types/
│ └── type-structures.ts # Type structure definitions (NEW in v2.22.21)
├── constants/
│ └── type-structures.ts # 22 complete type structures (NEW in v2.22.21)
├── templates/
│ ├── template-fetcher.ts # Fetches templates from n8n.io API (NEW in v2.4.1)
│ ├── template-repository.ts # Template database operations (NEW in v2.4.1)
@@ -45,7 +40,6 @@ src/
│ ├── test-nodes.ts # Critical node tests
│ ├── test-essentials.ts # Test new essentials tools (NEW in v2.4)
│ ├── test-enhanced-validation.ts # Test enhanced validation (NEW in v2.4.2)
│ ├── test-structure-validation.ts # Test type structure validation (NEW in v2.22.21)
│ ├── test-workflow-validation.ts # Test workflow validation (NEW in v2.5.0)
│ ├── test-ai-workflow-validation.ts # Test AI workflow validation (NEW in v2.5.1)
│ ├── test-mcp-tools.ts # Test MCP tool enhancements (NEW in v2.5.1)
@@ -82,7 +76,6 @@ npm run test:unit # Run unit tests only
npm run test:integration # Run integration tests
npm run test:coverage # Run tests with coverage report
npm run test:watch # Run tests in watch mode
npm run test:structure-validation # Test type structure validation (Phase 3)
# Run a single test file
npm test -- tests/unit/services/property-filter.test.ts
@@ -133,7 +126,6 @@ npm run test:templates # Test template functionality
4. **Service Layer** (`services/`)
- **Property Filter**: Reduces node properties to AI-friendly essentials
- **Config Validator**: Multi-profile validation system
- **Type Structure Service**: Validates complex type structures (filter, resourceMapper, etc.)
- **Expression Validator**: Validates n8n expression syntax
- **Workflow Validator**: Complete workflow structure validation

View File

@@ -70,4 +70,4 @@ We may update this privacy policy from time to time. Updates will be reflected i
For questions about telemetry or privacy, please open an issue on GitHub:
https://github.com/czlonkowski/n8n-mcp/issues
Last updated: 2025-11-06
Last updated: 2025-09-25

View File

@@ -5,17 +5,17 @@
[![npm version](https://img.shields.io/npm/v/n8n-mcp.svg)](https://www.npmjs.com/package/n8n-mcp)
[![codecov](https://codecov.io/gh/czlonkowski/n8n-mcp/graph/badge.svg?token=YOUR_TOKEN)](https://codecov.io/gh/czlonkowski/n8n-mcp)
[![Tests](https://img.shields.io/badge/tests-3336%20passing-brightgreen.svg)](https://github.com/czlonkowski/n8n-mcp/actions)
[![n8n version](https://img.shields.io/badge/n8n-1.120.3-orange.svg)](https://github.com/n8n-io/n8n)
[![n8n version](https://img.shields.io/badge/n8n-1.118.1-orange.svg)](https://github.com/n8n-io/n8n)
[![Docker](https://img.shields.io/badge/docker-ghcr.io%2Fczlonkowski%2Fn8n--mcp-green.svg)](https://github.com/czlonkowski/n8n-mcp/pkgs/container/n8n-mcp)
[![Deploy on Railway](https://railway.com/button.svg)](https://railway.com/deploy/n8n-mcp?referralCode=n8n-mcp)
A Model Context Protocol (MCP) server that provides AI assistants with comprehensive access to n8n node documentation, properties, and operations. Deploy in minutes to give Claude and other AI assistants deep knowledge about n8n's 543 workflow automation nodes.
A Model Context Protocol (MCP) server that provides AI assistants with comprehensive access to n8n node documentation, properties, and operations. Deploy in minutes to give Claude and other AI assistants deep knowledge about n8n's 541 workflow automation nodes.
## Overview
n8n-MCP serves as a bridge between n8n's workflow automation platform and AI models, enabling them to understand and work with n8n nodes effectively. It provides structured access to:
- 📚 **543 n8n nodes** from both n8n-nodes-base and @n8n/n8n-nodes-langchain
- 📚 **541 n8n nodes** from both n8n-nodes-base and @n8n/n8n-nodes-langchain
- 🔧 **Node properties** - 99% coverage with detailed schemas
-**Node operations** - 63.6% coverage of available actions
- 📄 **Documentation** - 87% coverage from official n8n docs (including AI nodes)
@@ -1114,13 +1114,6 @@ Current database coverage (n8n v1.117.2):
## 🔄 Recent Updates
### v2.22.19 - Critical Bug Fix
**Fixed:** Stack overflow in session removal (Issue #427)
- Eliminated infinite recursion in HTTP server session cleanup
- Transport resources now deleted before closing to prevent circular event handler chain
- Production logs no longer show "RangeError: Maximum call stack size exceeded"
- All session cleanup operations now complete successfully without crashes
See [CHANGELOG.md](./docs/CHANGELOG.md) for full version history and recent changes.
## ⚠️ Known Issues

View File

@@ -1,318 +0,0 @@
# N8N-MCP Validation Analysis: Complete Report
**Date**: November 8, 2025
**Dataset**: 29,218 validation events | 9,021 unique users | 90 days
**Status**: Complete and ready for action
---
## Analysis Documents
### 1. ANALYSIS_QUICK_REFERENCE.md (5.8KB)
**Best for**: Quick decisions, meetings, slide presentations
START HERE if you want the key points in 5 minutes.
**Contains**:
- One-paragraph core finding
- Top 3 problem areas with root causes
- 5 most common errors
- Implementation plan summary
- Key metrics & targets
- FAQ section
---
### 2. VALIDATION_ANALYSIS_SUMMARY.md (13KB)
**Best for**: Executive stakeholders, team leads, decision makers
Read this for comprehensive but concise overview.
**Contains**:
- One-page executive summary
- Health scorecard with key metrics
- Detailed problem area breakdown
- Error category distribution
- Agent behavior insights
- Tool usage patterns
- Documentation impact findings
- Top 5 recommendations with ROI estimates
- 50-65% improvement projection
---
### 3. VALIDATION_ANALYSIS_REPORT.md (27KB)
**Best for**: Technical deep-dive, implementation planning, root cause analysis
Complete reference document with all findings.
**Contains**:
- All 16 SQL queries (reproducible)
- Node-specific difficulty ranking (top 20)
- Top 25 unique validation error messages
- Error categorization with root causes
- Tool usage patterns before failures
- Search query analysis
- Documentation effectiveness study
- Retry success rate analysis
- Property-level difficulty matrix
- 8 detailed recommendations with implementation guides
- Phase-by-phase action items
- KPI tracking setup
- Complete appendix with error message reference
---
### 4. IMPLEMENTATION_ROADMAP.md (4.3KB)
**Best for**: Project managers, development team, sprint planning
Actionable roadmap for the next 6 weeks.
**Contains**:
- Phase 1-3 breakdown (2 weeks each)
- Specific file locations to modify
- Effort estimates per task
- Success criteria for each phase
- Expected impact projections
- Code examples (before/after)
- Key changes documentation
---
## Reading Paths
### Path A: Decision Maker (30 minutes)
1. Read: ANALYSIS_QUICK_REFERENCE.md
2. Review: Key metrics in VALIDATION_ANALYSIS_SUMMARY.md
3. Decision: Approve IMPLEMENTATION_ROADMAP.md
### Path B: Product Manager (1 hour)
1. Read: VALIDATION_ANALYSIS_SUMMARY.md
2. Skim: Top recommendations in VALIDATION_ANALYSIS_REPORT.md
3. Review: IMPLEMENTATION_ROADMAP.md
4. Check: Success metrics and timelines
### Path C: Technical Lead (2-3 hours)
1. Read: ANALYSIS_QUICK_REFERENCE.md
2. Deep-dive: VALIDATION_ANALYSIS_REPORT.md
3. Study: IMPLEMENTATION_ROADMAP.md
4. Review: Code examples and SQL queries
5. Plan: Ticket creation and sprint allocation
### Path D: Developer (3-4 hours)
1. Skim: ANALYSIS_QUICK_REFERENCE.md for context
2. Read: VALIDATION_ANALYSIS_REPORT.md sections 3-8
3. Study: IMPLEMENTATION_ROADMAP.md thoroughly
4. Review: All code locations and examples
5. Plan: First task implementation
---
## Key Findings Overview
### The Core Insight
Validation failures are NOT broken—they're evidence the system works perfectly. 29,218 validation events prevented bad deployments. The challenge is GUIDANCE GAPS that cause first-attempt failures.
### Success Evidence
- 100% same-day error recovery rate
- 100% retry success rate
- All agents fix errors when given feedback
- Zero "unfixable" errors
### Problem Areas (75% of errors)
1. **Workflow structure** (26%) - JSON malformation
2. **Connections** (14%) - Unintuitive syntax
3. **Required fields** (8%) - Not marked upfront
### Most Problematic Nodes
- Webhook/Trigger (127 failures)
- Slack (73 failures)
- AI Agent (36 failures)
- HTTP Request (31 failures)
- OpenAI (35 failures)
### Solution Strategy
- Phase 1: Better error messages + required field markers (25-30% reduction)
- Phase 2: Documentation + validation improvements (additional 15-20%)
- Phase 3: Advanced features + monitoring (additional 10-15%)
- **Target**: 50-65% total failure reduction in 6 weeks
---
## Critical Numbers
```
Validation Events ............. 29,218
Unique Users .................. 9,021
Data Quality .................. 100% (all marked as errors)
Current Metrics:
Error Rate (doc users) ....... 12.6%
Error Rate (non-doc users) ... 10.8%
First-attempt success ........ ~77%
Retry success ................ 100%
Same-day recovery ............ 100%
Target Metrics (after 6 weeks):
Error Rate ................... 6-7% (-50%)
First-attempt success ........ 85%+
Retry success ................ 100%
Implementation effort ........ 60-80 hours
```
---
## Implementation Timeline
```
Week 1-2: Phase 1 (Error messages, field markers, webhook guide)
Expected: 25-30% failure reduction
Week 3-4: Phase 2 (Enum suggestions, connection guide, AI validation)
Expected: Additional 15-20% reduction
Week 5-6: Phase 3 (Search improvements, fuzzy matching, KPI setup)
Expected: Additional 10-15% reduction
Target: 50-65% total reduction by Week 6
```
---
## How to Use These Documents
### For Review & Approval
1. Start with ANALYSIS_QUICK_REFERENCE.md
2. Check key metrics in VALIDATION_ANALYSIS_SUMMARY.md
3. Review IMPLEMENTATION_ROADMAP.md for feasibility
4. Decision: Approve phase 1-3
### For Team Planning
1. Read IMPLEMENTATION_ROADMAP.md
2. Create GitHub issues from each task
3. Assign based on effort estimates
4. Schedule sprints for phase 1-3
### For Development
1. Review specific recommendations in VALIDATION_ANALYSIS_REPORT.md
2. Find code locations in IMPLEMENTATION_ROADMAP.md
3. Study code examples (before/after)
4. Implement and test
### For Measurement
1. Record baseline metrics (current state)
2. Deploy Phase 1 and measure impact
3. Use KPI queries from VALIDATION_ANALYSIS_REPORT.md
4. Adjust strategy based on actual results
---
## Key Recommendations (Priority Order)
### IMMEDIATE (Week 1-2)
1. **Enhance error messages** - Add location + examples
2. **Mark required fields** - Add "⚠️ REQUIRED" to tools
3. **Create webhook guide** - Document configuration rules
### HIGH (Week 3-4)
4. **Add enum suggestions** - Show valid values in errors
5. **Create connections guide** - Document syntax + examples
6. **Add AI Agent validation** - Detect missing LLM connections
### MEDIUM (Week 5-6)
7. **Improve search results** - Add configuration hints
8. **Build fuzzy matcher** - Suggest similar node types
9. **Setup KPI tracking** - Monitor improvement
---
## Questions & Answers
**Q: Why so many validation failures?**
A: High usage (9,021 users, complex workflows). System is working—preventing bad deployments.
**Q: Shouldn't we just allow invalid configurations?**
A: No, validation prevents 29,218 broken workflows from deploying. We improve guidance instead.
**Q: Do agents actually learn from errors?**
A: Yes, 100% same-day recovery rate proves feedback works perfectly.
**Q: Can we really reduce failures by 50-65%?**
A: Yes, analysis shows these specific improvements target the actual root causes.
**Q: How long will this take?**
A: 60-80 developer-hours across 6 weeks. Can start immediately.
**Q: What's the biggest win?**
A: Marking required fields (378 errors) + better structure messages (1,268 errors).
---
## Next Steps
1. **This Week**: Review all documents and get approval
2. **Week 1**: Create GitHub issues from IMPLEMENTATION_ROADMAP.md
3. **Week 2**: Assign to team, start Phase 1
4. **Week 4**: Deploy Phase 1, start Phase 2
5. **Week 6**: Deploy Phase 2, start Phase 3
6. **Week 8**: Deploy Phase 3, begin monitoring
7. **Week 9+**: Review metrics, iterate
---
## File Structure
```
/Users/romualdczlonkowski/Pliki/n8n-mcp/n8n-mcp/
├── ANALYSIS_QUICK_REFERENCE.md ............ Quick lookup (5.8KB)
├── VALIDATION_ANALYSIS_SUMMARY.md ........ Executive summary (13KB)
├── VALIDATION_ANALYSIS_REPORT.md ......... Complete analysis (27KB)
├── IMPLEMENTATION_ROADMAP.md ............. Action plan (4.3KB)
└── README_ANALYSIS.md ................... This file
```
**Total Documentation**: 50KB of analysis, recommendations, and implementation guidance
---
## Contact & Support
For specific questions:
- **Why?** → See VALIDATION_ANALYSIS_REPORT.md Section 2-8
- **How?** → See IMPLEMENTATION_ROADMAP.md for code locations
- **When?** → See IMPLEMENTATION_ROADMAP.md for timeline
- **Metrics?** → See VALIDATION_ANALYSIS_SUMMARY.md key metrics section
---
## Metadata
| Item | Value |
|------|-------|
| Analysis Date | November 8, 2025 |
| Data Period | Sept 26 - Nov 8, 2025 (90 days) |
| Sample Size | 29,218 validation events |
| Users Analyzed | 9,021 unique users |
| SQL Queries | 16 comprehensive queries |
| Confidence Level | HIGH |
| Status | Complete & Ready for Implementation |
---
## Analysis Methodology
1. **Data Collection**: Extracted all validation_details events from PostgreSQL
2. **Categorization**: Grouped errors by type, node, and message pattern
3. **Pattern Analysis**: Identified root causes for each error category
4. **User Behavior**: Tracked tool usage before/after failures
5. **Recovery Analysis**: Measured success rates and correction time
6. **Recommendation Development**: Mapped solutions to specific problems
7. **Impact Projection**: Estimated improvement from each solution
8. **Roadmap Creation**: Phased implementation plan with effort estimates
**Data Quality**: 100% of validation events properly categorized, no data loss or corruption
---
**Analysis Complete** | **Ready for Review** | **Awaiting Approval to Proceed**

Binary file not shown.

View File

@@ -1,239 +0,0 @@
# Type Structure Validation
## Overview
Type Structure Validation is an automatic validation system that ensures complex n8n node configurations conform to their expected data structures. Implemented as part of the n8n-mcp validation system, it provides zero-configuration validation for special n8n types that have complex nested structures.
**Status:** Production (v2.22.21+)
**Performance:** 100% pass rate on 776 real-world validations
**Speed:** 0.01ms average validation time (500x faster than target)
The system automatically validates node configurations without requiring any additional setup or configuration from users or AI assistants.
## Supported Types
The validation system supports four special n8n types that have complex structures:
### 1. **filter** (FilterValue)
Complex filtering conditions with boolean operators, comparison operations, and nested logic.
**Structure:**
- `combinator`: "and" | "or" - How conditions are combined
- `conditions`: Array of filter conditions
- Each condition has: `leftValue`, `operator` (type + operation), `rightValue`
- Supports 40+ operations: equals, contains, exists, notExists, gt, lt, regex, etc.
**Example Usage:** IF node, Switch node condition filtering
### 2. **resourceMapper** (ResourceMapperValue)
Data mapping configuration for transforming data between different formats.
**Structure:**
- `mappingMode`: "defineBelow" | "autoMapInputData" | "mapManually"
- `value`: Field mappings or expressions
- `matchingColumns`: Column matching configuration
- `schema`: Target schema definition
**Example Usage:** Google Sheets node, Airtable node data mapping
### 3. **assignmentCollection** (AssignmentCollectionValue)
Variable assignments for setting multiple values at once.
**Structure:**
- `assignments`: Array of name-value pairs
- Each assignment has: `name`, `value`, `type`
**Example Usage:** Set node, Code node variable assignments
### 4. **resourceLocator** (INodeParameterResourceLocator)
Resource selection with multiple lookup modes (ID, name, URL, etc.).
**Structure:**
- `mode`: "id" | "list" | "url" | "name"
- `value`: Resource identifier (string, number, or expression)
- `cachedResultName`: Optional cached display name
- `cachedResultUrl`: Optional cached URL
**Example Usage:** Google Sheets spreadsheet selection, Slack channel selection
## Performance & Results
The validation system was tested against real-world n8n.io workflow templates:
| Metric | Result |
|--------|--------|
| **Templates Tested** | 91 (top by popularity) |
| **Nodes Validated** | 616 nodes with special types |
| **Total Validations** | 776 property validations |
| **Pass Rate** | 100.00% (776/776) |
| **False Positive Rate** | 0.00% |
| **Average Time** | 0.01ms per validation |
| **Max Time** | 1.00ms per validation |
| **Performance vs Target** | 500x faster than 50ms target |
### Type-Specific Results
- `filter`: 93/93 passed (100.00%)
- `resourceMapper`: 69/69 passed (100.00%)
- `assignmentCollection`: 213/213 passed (100.00%)
- `resourceLocator`: 401/401 passed (100.00%)
## How It Works
### Automatic Integration
Structure validation is automatically applied during node configuration validation. When you call `validate_node_operation` or `validate_node_minimal`, the system:
1. **Identifies Special Types**: Detects properties that use filter, resourceMapper, assignmentCollection, or resourceLocator types
2. **Validates Structure**: Checks that the configuration matches the expected structure for that type
3. **Validates Operations**: For filter types, validates that operations are supported for the data type
4. **Provides Context**: Returns specific error messages with property paths and fix suggestions
### Validation Flow
```
User/AI provides node config
validate_node_operation (MCP tool)
EnhancedConfigValidator.validateWithMode()
validateSpecialTypeStructures() ← Automatic structure validation
TypeStructureService.validateStructure()
Returns validation result with errors/warnings/suggestions
```
### Edge Cases Handled
**1. Credential-Provided Fields**
- Fields like Google Sheets `sheetId` that come from n8n credentials at runtime are excluded from validation
- No false positives for fields that aren't in the configuration
**2. Filter Operations**
- Universal operations (`exists`, `notExists`, `isNotEmpty`) work across all data types
- Type-specific operations validated (e.g., `regex` only for strings, `gt`/`lt` only for numbers)
**3. Node-Specific Logic**
- Custom validation logic for specific nodes (Google Sheets, Slack, etc.)
- Context-aware error messages that understand the node's operation
## Example Validation Error
### Invalid Filter Structure
**Configuration:**
```json
{
"conditions": {
"combinator": "and",
"conditions": [
{
"leftValue": "={{ $json.status }}",
"rightValue": "active",
"operator": {
"type": "string",
"operation": "invalidOperation" // ❌ Not a valid operation
}
}
]
}
}
```
**Validation Error:**
```json
{
"valid": false,
"errors": [
{
"type": "invalid_structure",
"property": "conditions.conditions[0].operator.operation",
"message": "Unsupported operation 'invalidOperation' for type 'string'",
"suggestion": "Valid operations for string: equals, notEquals, contains, notContains, startsWith, endsWith, regex, exists, notExists, isNotEmpty"
}
]
}
```
## Technical Details
### Implementation
- **Type Definitions**: `src/types/type-structures.ts` (301 lines)
- **Type Structures**: `src/constants/type-structures.ts` (741 lines, 22 complete type structures)
- **Service Layer**: `src/services/type-structure-service.ts` (427 lines)
- **Validator Integration**: `src/services/enhanced-config-validator.ts` (line 270)
- **Node-Specific Logic**: `src/services/node-specific-validators.ts`
### Test Coverage
- **Unit Tests**:
- `tests/unit/types/type-structures.test.ts` (14 tests)
- `tests/unit/constants/type-structures.test.ts` (39 tests)
- `tests/unit/services/type-structure-service.test.ts` (64 tests)
- `tests/unit/services/enhanced-config-validator-type-structures.test.ts`
- **Integration Tests**:
- `tests/integration/validation/real-world-structure-validation.test.ts` (8 tests, 388ms)
- **Validation Scripts**:
- `scripts/test-structure-validation.ts` - Standalone validation against 100 templates
### Documentation
- **Implementation Plan**: `docs/local/v3/implementation-plan-final.md` - Complete technical specifications
- **Phase Results**: Phases 1-3 completed with 100% success criteria met
## For Developers
### Adding New Type Structures
1. Define the type structure in `src/constants/type-structures.ts`
2. Add validation logic in `TypeStructureService.validateStructure()`
3. Add tests in `tests/unit/constants/type-structures.test.ts`
4. Test against real templates using `scripts/test-structure-validation.ts`
### Testing Structure Validation
**Run Unit Tests:**
```bash
npm run test:unit -- tests/unit/services/enhanced-config-validator-type-structures.test.ts
```
**Run Integration Tests:**
```bash
npm run test:integration -- tests/integration/validation/real-world-structure-validation.test.ts
```
**Run Full Validation:**
```bash
npm run test:structure-validation
```
### Relevant Test Files
- **Type Tests**: `tests/unit/types/type-structures.test.ts`
- **Structure Tests**: `tests/unit/constants/type-structures.test.ts`
- **Service Tests**: `tests/unit/services/type-structure-service.test.ts`
- **Validator Tests**: `tests/unit/services/enhanced-config-validator-type-structures.test.ts`
- **Integration Tests**: `tests/integration/validation/real-world-structure-validation.test.ts`
- **Real-World Validation**: `scripts/test-structure-validation.ts`
## Production Readiness
**All Tests Passing**: 100% pass rate on unit and integration tests
**Performance Validated**: 0.01ms average (500x better than 50ms target)
**Zero Breaking Changes**: Fully backward compatible
**Real-World Validation**: 91 templates, 616 nodes, 776 validations
**Production Deployment**: Successfully deployed in v2.22.21
**Edge Cases Handled**: Credential fields, filter operations, node-specific logic
## Version History
- **v2.22.21** (2025-11-21): Type structure validation system completed (Phases 1-3)
- 22 complete type structures defined
- 100% pass rate on real-world validation
- 0.01ms average validation time
- Zero false positives

View File

@@ -162,7 +162,7 @@ n8n_validate_workflow({id: createdWorkflowId})
n8n_update_partial_workflow({
workflowId: id,
operations: [
{type: 'updateNode', nodeId: 'slack1', updates: {position: [100, 200]}}
{type: 'updateNode', nodeId: 'slack1', changes: {position: [100, 200]}}
]
})

2318
package-lock.json generated

File diff suppressed because it is too large Load Diff

View File

@@ -1,6 +1,6 @@
{
"name": "n8n-mcp",
"version": "2.23.0",
"version": "2.22.10",
"description": "Integration between n8n workflow automation and Model Context Protocol (MCP)",
"main": "dist/index.js",
"types": "dist/index.d.ts",
@@ -66,7 +66,6 @@
"test:workflow-diff": "node dist/scripts/test-workflow-diff.js",
"test:transactional-diff": "node dist/scripts/test-transactional-diff.js",
"test:tools-documentation": "node dist/scripts/test-tools-documentation.js",
"test:structure-validation": "npx tsx scripts/test-structure-validation.ts",
"test:url-configuration": "npm run build && ts-node scripts/test-url-configuration.ts",
"test:search-improvements": "node dist/scripts/test-search-improvements.js",
"test:fts5-search": "node dist/scripts/test-fts5-search.js",
@@ -141,15 +140,15 @@
},
"dependencies": {
"@modelcontextprotocol/sdk": "^1.20.1",
"@n8n/n8n-nodes-langchain": "^1.119.1",
"@n8n/n8n-nodes-langchain": "^1.117.0",
"@supabase/supabase-js": "^2.57.4",
"dotenv": "^16.5.0",
"express": "^5.1.0",
"express-rate-limit": "^7.1.5",
"lru-cache": "^11.2.1",
"n8n": "^1.120.3",
"n8n-core": "^1.119.2",
"n8n-workflow": "^1.117.0",
"n8n": "^1.118.1",
"n8n-core": "^1.117.0",
"n8n-workflow": "^1.115.0",
"openai": "^4.77.0",
"sql.js": "^1.13.0",
"tslib": "^2.6.2",

View File

@@ -1,6 +1,6 @@
{
"name": "n8n-mcp-runtime",
"version": "2.23.0",
"version": "2.22.10",
"description": "n8n MCP Server Runtime Dependencies Only",
"private": true,
"dependencies": {

View File

@@ -1,192 +0,0 @@
/**
* Backfill script to populate structural hashes for existing workflow mutations
*
* Purpose: Generates workflow_structure_hash_before and workflow_structure_hash_after
* for all existing mutations to enable cross-referencing with telemetry_workflows
*
* Usage: npx tsx scripts/backfill-mutation-hashes.ts
*
* Conceived by Romuald Członkowski - https://www.aiadvisors.pl/en
*/
import { WorkflowSanitizer } from '../src/telemetry/workflow-sanitizer.js';
import { createClient } from '@supabase/supabase-js';
// Initialize Supabase client
const supabaseUrl = process.env.SUPABASE_URL || '';
const supabaseKey = process.env.SUPABASE_SERVICE_ROLE_KEY || '';
if (!supabaseUrl || !supabaseKey) {
console.error('Error: SUPABASE_URL and SUPABASE_SERVICE_ROLE_KEY environment variables are required');
process.exit(1);
}
const supabase = createClient(supabaseUrl, supabaseKey);
interface MutationRecord {
id: string;
workflow_before: any;
workflow_after: any;
workflow_structure_hash_before: string | null;
workflow_structure_hash_after: string | null;
}
/**
* Fetch all mutations that need structural hashes
*/
async function fetchMutationsToBackfill(): Promise<MutationRecord[]> {
console.log('Fetching mutations without structural hashes...');
const { data, error } = await supabase
.from('workflow_mutations')
.select('id, workflow_before, workflow_after, workflow_structure_hash_before, workflow_structure_hash_after')
.is('workflow_structure_hash_before', null);
if (error) {
throw new Error(`Failed to fetch mutations: ${error.message}`);
}
console.log(`Found ${data?.length || 0} mutations to backfill`);
return data || [];
}
/**
* Generate structural hash for a workflow
*/
function generateStructuralHash(workflow: any): string {
try {
return WorkflowSanitizer.generateWorkflowHash(workflow);
} catch (error) {
console.error('Error generating hash:', error);
return '';
}
}
/**
* Update a single mutation with structural hashes
*/
async function updateMutation(id: string, structureHashBefore: string, structureHashAfter: string): Promise<boolean> {
const { error } = await supabase
.from('workflow_mutations')
.update({
workflow_structure_hash_before: structureHashBefore,
workflow_structure_hash_after: structureHashAfter,
})
.eq('id', id);
if (error) {
console.error(`Failed to update mutation ${id}:`, error.message);
return false;
}
return true;
}
/**
* Process mutations in batches
*/
async function backfillMutations() {
const startTime = Date.now();
console.log('Starting backfill process...\n');
// Fetch mutations
const mutations = await fetchMutationsToBackfill();
if (mutations.length === 0) {
console.log('No mutations need backfilling. All done!');
return;
}
let processedCount = 0;
let successCount = 0;
let errorCount = 0;
const errors: Array<{ id: string; error: string }> = [];
// Process each mutation
for (const mutation of mutations) {
try {
// Generate structural hashes
const structureHashBefore = generateStructuralHash(mutation.workflow_before);
const structureHashAfter = generateStructuralHash(mutation.workflow_after);
if (!structureHashBefore || !structureHashAfter) {
console.warn(`Skipping mutation ${mutation.id}: Failed to generate hashes`);
errors.push({ id: mutation.id, error: 'Failed to generate hashes' });
errorCount++;
continue;
}
// Update database
const success = await updateMutation(mutation.id, structureHashBefore, structureHashAfter);
if (success) {
successCount++;
} else {
errorCount++;
errors.push({ id: mutation.id, error: 'Database update failed' });
}
processedCount++;
// Progress update every 100 mutations
if (processedCount % 100 === 0) {
const elapsed = ((Date.now() - startTime) / 1000).toFixed(1);
const rate = (processedCount / (Date.now() - startTime) * 1000).toFixed(1);
console.log(
`Progress: ${processedCount}/${mutations.length} (${((processedCount / mutations.length) * 100).toFixed(1)}%) | ` +
`Success: ${successCount} | Errors: ${errorCount} | Rate: ${rate}/s | Elapsed: ${elapsed}s`
);
}
} catch (error) {
console.error(`Unexpected error processing mutation ${mutation.id}:`, error);
errors.push({ id: mutation.id, error: String(error) });
errorCount++;
}
}
// Final summary
const duration = ((Date.now() - startTime) / 1000).toFixed(1);
console.log('\n' + '='.repeat(80));
console.log('BACKFILL COMPLETE');
console.log('='.repeat(80));
console.log(`Total mutations processed: ${processedCount}`);
console.log(`Successfully updated: ${successCount}`);
console.log(`Errors: ${errorCount}`);
console.log(`Duration: ${duration}s`);
console.log(`Average rate: ${(processedCount / (Date.now() - startTime) * 1000).toFixed(1)} mutations/s`);
if (errors.length > 0) {
console.log('\nErrors encountered:');
errors.slice(0, 10).forEach(({ id, error }) => {
console.log(` - ${id}: ${error}`);
});
if (errors.length > 10) {
console.log(` ... and ${errors.length - 10} more errors`);
}
}
// Verify cross-reference matches
console.log('\n' + '='.repeat(80));
console.log('VERIFYING CROSS-REFERENCE MATCHES');
console.log('='.repeat(80));
const { data: statsData, error: statsError } = await supabase.rpc('get_mutation_crossref_stats');
if (statsError) {
console.error('Failed to get cross-reference stats:', statsError.message);
} else if (statsData && statsData.length > 0) {
const stats = statsData[0];
console.log(`Total mutations: ${stats.total_mutations}`);
console.log(`Before matches: ${stats.before_matches} (${stats.before_match_rate}%)`);
console.log(`After matches: ${stats.after_matches} (${stats.after_match_rate}%)`);
console.log(`Both matches: ${stats.both_matches}`);
}
console.log('\nBackfill process completed successfully! ✓');
}
// Run the backfill
backfillMutations().catch((error) => {
console.error('Fatal error during backfill:', error);
process.exit(1);
});

View File

@@ -1,470 +0,0 @@
#!/usr/bin/env ts-node
/**
* Phase 3: Real-World Type Structure Validation
*
* Tests type structure validation against real workflow templates from n8n.io
* to ensure production readiness. Validates filter, resourceMapper,
* assignmentCollection, and resourceLocator types.
*
* Usage:
* npm run build && node dist/scripts/test-structure-validation.js
*
* or with ts-node:
* npx ts-node scripts/test-structure-validation.ts
*/
import { createDatabaseAdapter } from '../src/database/database-adapter';
import { EnhancedConfigValidator } from '../src/services/enhanced-config-validator';
import type { NodePropertyTypes } from 'n8n-workflow';
import { gunzipSync } from 'zlib';
interface ValidationResult {
templateId: number;
templateName: string;
templateViews: number;
nodeId: string;
nodeName: string;
nodeType: string;
propertyName: string;
propertyType: NodePropertyTypes;
valid: boolean;
errors: Array<{ type: string; property?: string; message: string }>;
warnings: Array<{ type: string; property?: string; message: string }>;
validationTimeMs: number;
}
interface ValidationStats {
totalTemplates: number;
totalNodes: number;
totalValidations: number;
passedValidations: number;
failedValidations: number;
byType: Record<string, { passed: number; failed: number }>;
byError: Record<string, number>;
avgValidationTimeMs: number;
maxValidationTimeMs: number;
}
// Special types we want to validate
const SPECIAL_TYPES: NodePropertyTypes[] = [
'filter',
'resourceMapper',
'assignmentCollection',
'resourceLocator',
];
function decompressWorkflow(compressed: string): any {
try {
const buffer = Buffer.from(compressed, 'base64');
const decompressed = gunzipSync(buffer);
return JSON.parse(decompressed.toString('utf-8'));
} catch (error: any) {
throw new Error(`Failed to decompress workflow: ${error.message}`);
}
}
async function loadTopTemplates(db: any, limit: number = 100) {
console.log(`📥 Loading top ${limit} templates by popularity...\n`);
const stmt = db.prepare(`
SELECT
id,
name,
workflow_json_compressed,
views
FROM templates
WHERE workflow_json_compressed IS NOT NULL
ORDER BY views DESC
LIMIT ?
`);
const templates = stmt.all(limit);
console.log(`✓ Loaded ${templates.length} templates\n`);
return templates;
}
function extractNodesWithSpecialTypes(workflowJson: any): Array<{
nodeId: string;
nodeName: string;
nodeType: string;
properties: Array<{ name: string; type: NodePropertyTypes; value: any }>;
}> {
const results: Array<any> = [];
if (!workflowJson || !workflowJson.nodes || !Array.isArray(workflowJson.nodes)) {
return results;
}
for (const node of workflowJson.nodes) {
// Check if node has parameters with special types
if (!node.parameters || typeof node.parameters !== 'object') {
continue;
}
const specialProperties: Array<{ name: string; type: NodePropertyTypes; value: any }> = [];
// Check each parameter against our special types
for (const [paramName, paramValue] of Object.entries(node.parameters)) {
// Try to infer type from structure
const inferredType = inferPropertyType(paramValue);
if (inferredType && SPECIAL_TYPES.includes(inferredType)) {
specialProperties.push({
name: paramName,
type: inferredType,
value: paramValue,
});
}
}
if (specialProperties.length > 0) {
results.push({
nodeId: node.id,
nodeName: node.name,
nodeType: node.type,
properties: specialProperties,
});
}
}
return results;
}
function inferPropertyType(value: any): NodePropertyTypes | null {
if (!value || typeof value !== 'object') {
return null;
}
// Filter type: has combinator and conditions
if (value.combinator && value.conditions) {
return 'filter';
}
// ResourceMapper type: has mappingMode
if (value.mappingMode) {
return 'resourceMapper';
}
// AssignmentCollection type: has assignments array
if (value.assignments && Array.isArray(value.assignments)) {
return 'assignmentCollection';
}
// ResourceLocator type: has mode and value
if (value.mode && value.hasOwnProperty('value')) {
return 'resourceLocator';
}
return null;
}
async function validateTemplate(
templateId: number,
templateName: string,
templateViews: number,
workflowJson: any
): Promise<ValidationResult[]> {
const results: ValidationResult[] = [];
// Extract nodes with special types
const nodesWithSpecialTypes = extractNodesWithSpecialTypes(workflowJson);
for (const node of nodesWithSpecialTypes) {
for (const prop of node.properties) {
const startTime = Date.now();
// Create property definition for validation
const properties = [
{
name: prop.name,
type: prop.type,
required: true,
displayName: prop.name,
default: {},
},
];
// Create config with just this property
const config = {
[prop.name]: prop.value,
};
try {
// Run validation
const validationResult = EnhancedConfigValidator.validateWithMode(
node.nodeType,
config,
properties,
'operation',
'ai-friendly'
);
const validationTimeMs = Date.now() - startTime;
results.push({
templateId,
templateName,
templateViews,
nodeId: node.nodeId,
nodeName: node.nodeName,
nodeType: node.nodeType,
propertyName: prop.name,
propertyType: prop.type,
valid: validationResult.valid,
errors: validationResult.errors || [],
warnings: validationResult.warnings || [],
validationTimeMs,
});
} catch (error: any) {
const validationTimeMs = Date.now() - startTime;
results.push({
templateId,
templateName,
templateViews,
nodeId: node.nodeId,
nodeName: node.nodeName,
nodeType: node.nodeType,
propertyName: prop.name,
propertyType: prop.type,
valid: false,
errors: [
{
type: 'exception',
property: prop.name,
message: `Validation threw exception: ${error.message}`,
},
],
warnings: [],
validationTimeMs,
});
}
}
}
return results;
}
function calculateStats(results: ValidationResult[]): ValidationStats {
const stats: ValidationStats = {
totalTemplates: new Set(results.map(r => r.templateId)).size,
totalNodes: new Set(results.map(r => `${r.templateId}-${r.nodeId}`)).size,
totalValidations: results.length,
passedValidations: results.filter(r => r.valid).length,
failedValidations: results.filter(r => !r.valid).length,
byType: {},
byError: {},
avgValidationTimeMs: 0,
maxValidationTimeMs: 0,
};
// Stats by type
for (const type of SPECIAL_TYPES) {
const typeResults = results.filter(r => r.propertyType === type);
stats.byType[type] = {
passed: typeResults.filter(r => r.valid).length,
failed: typeResults.filter(r => !r.valid).length,
};
}
// Error frequency
for (const result of results.filter(r => !r.valid)) {
for (const error of result.errors) {
const key = `${error.type}: ${error.message}`;
stats.byError[key] = (stats.byError[key] || 0) + 1;
}
}
// Performance stats
if (results.length > 0) {
stats.avgValidationTimeMs =
results.reduce((sum, r) => sum + r.validationTimeMs, 0) / results.length;
stats.maxValidationTimeMs = Math.max(...results.map(r => r.validationTimeMs));
}
return stats;
}
function printStats(stats: ValidationStats) {
console.log('\n' + '='.repeat(80));
console.log('VALIDATION STATISTICS');
console.log('='.repeat(80) + '\n');
console.log(`📊 Total Templates Tested: ${stats.totalTemplates}`);
console.log(`📊 Total Nodes with Special Types: ${stats.totalNodes}`);
console.log(`📊 Total Property Validations: ${stats.totalValidations}\n`);
const passRate = (stats.passedValidations / stats.totalValidations * 100).toFixed(2);
const failRate = (stats.failedValidations / stats.totalValidations * 100).toFixed(2);
console.log(`✅ Passed: ${stats.passedValidations} (${passRate}%)`);
console.log(`❌ Failed: ${stats.failedValidations} (${failRate}%)\n`);
console.log('By Property Type:');
console.log('-'.repeat(80));
for (const [type, counts] of Object.entries(stats.byType)) {
const total = counts.passed + counts.failed;
if (total === 0) {
console.log(` ${type}: No occurrences found`);
} else {
const typePassRate = (counts.passed / total * 100).toFixed(2);
console.log(` ${type}: ${counts.passed}/${total} passed (${typePassRate}%)`);
}
}
console.log('\n⚡ Performance:');
console.log('-'.repeat(80));
console.log(` Average validation time: ${stats.avgValidationTimeMs.toFixed(2)}ms`);
console.log(` Maximum validation time: ${stats.maxValidationTimeMs.toFixed(2)}ms`);
const meetsTarget = stats.avgValidationTimeMs < 50;
console.log(` Target (<50ms): ${meetsTarget ? '✅ MET' : '❌ NOT MET'}\n`);
if (Object.keys(stats.byError).length > 0) {
console.log('🔍 Most Common Errors:');
console.log('-'.repeat(80));
const sortedErrors = Object.entries(stats.byError)
.sort((a, b) => b[1] - a[1])
.slice(0, 10);
for (const [error, count] of sortedErrors) {
console.log(` ${count}x: ${error}`);
}
}
}
function printFailures(results: ValidationResult[], maxFailures: number = 20) {
const failures = results.filter(r => !r.valid);
if (failures.length === 0) {
console.log('\n✨ No failures! All validations passed.\n');
return;
}
console.log('\n' + '='.repeat(80));
console.log(`VALIDATION FAILURES (showing first ${Math.min(maxFailures, failures.length)})` );
console.log('='.repeat(80) + '\n');
for (let i = 0; i < Math.min(maxFailures, failures.length); i++) {
const failure = failures[i];
console.log(`Failure ${i + 1}/${failures.length}:`);
console.log(` Template: ${failure.templateName} (ID: ${failure.templateId}, Views: ${failure.templateViews})`);
console.log(` Node: ${failure.nodeName} (${failure.nodeType})`);
console.log(` Property: ${failure.propertyName} (type: ${failure.propertyType})`);
console.log(` Errors:`);
for (const error of failure.errors) {
console.log(` - [${error.type}] ${error.property}: ${error.message}`);
}
if (failure.warnings.length > 0) {
console.log(` Warnings:`);
for (const warning of failure.warnings) {
console.log(` - [${warning.type}] ${warning.property}: ${warning.message}`);
}
}
console.log('');
}
if (failures.length > maxFailures) {
console.log(`... and ${failures.length - maxFailures} more failures\n`);
}
}
async function main() {
console.log('='.repeat(80));
console.log('PHASE 3: REAL-WORLD TYPE STRUCTURE VALIDATION');
console.log('='.repeat(80) + '\n');
// Initialize database
console.log('🔌 Connecting to database...');
const db = await createDatabaseAdapter('./data/nodes.db');
console.log('✓ Database connected\n');
// Load templates
const templates = await loadTopTemplates(db, 100);
// Validate each template
console.log('🔍 Validating templates...\n');
const allResults: ValidationResult[] = [];
let processedCount = 0;
let nodesFound = 0;
for (const template of templates) {
processedCount++;
let workflowJson;
try {
workflowJson = decompressWorkflow(template.workflow_json_compressed);
} catch (error) {
console.warn(`⚠️ Template ${template.id}: Decompression failed, skipping`);
continue;
}
const results = await validateTemplate(
template.id,
template.name,
template.views,
workflowJson
);
if (results.length > 0) {
nodesFound += new Set(results.map(r => r.nodeId)).size;
allResults.push(...results);
const passedCount = results.filter(r => r.valid).length;
const status = passedCount === results.length ? '✓' : '✗';
console.log(
`${status} Template ${processedCount}/${templates.length}: ` +
`"${template.name}" (${results.length} validations, ${passedCount} passed)`
);
}
}
console.log(`\n✓ Processed ${processedCount} templates`);
console.log(`✓ Found ${nodesFound} nodes with special types\n`);
// Calculate and print statistics
const stats = calculateStats(allResults);
printStats(stats);
// Print detailed failures
printFailures(allResults);
// Success criteria check
console.log('='.repeat(80));
console.log('SUCCESS CRITERIA CHECK');
console.log('='.repeat(80) + '\n');
const passRate = (stats.passedValidations / stats.totalValidations * 100);
const falsePositiveRate = (stats.failedValidations / stats.totalValidations * 100);
const avgTime = stats.avgValidationTimeMs;
console.log(`Pass Rate: ${passRate.toFixed(2)}% (target: >95%) ${passRate > 95 ? '✅' : '❌'}`);
console.log(`False Positive Rate: ${falsePositiveRate.toFixed(2)}% (target: <5%) ${falsePositiveRate < 5 ? '✅' : '❌'}`);
console.log(`Avg Validation Time: ${avgTime.toFixed(2)}ms (target: <50ms) ${avgTime < 50 ? '✅' : '❌'}\n`);
const allCriteriaMet = passRate > 95 && falsePositiveRate < 5 && avgTime < 50;
if (allCriteriaMet) {
console.log('🎉 ALL SUCCESS CRITERIA MET! Phase 3 validation complete.\n');
} else {
console.log('⚠️ Some success criteria not met. Iteration required.\n');
}
// Close database
db.close();
process.exit(allCriteriaMet ? 0 : 1);
}
// Run the script
main().catch((error) => {
console.error('Fatal error:', error);
process.exit(1);
});

View File

@@ -1,741 +0,0 @@
/**
* Type Structure Constants
*
* Complete definitions for all n8n NodePropertyTypes.
* These structures define the expected data format, JavaScript type,
* validation rules, and examples for each property type.
*
* Based on n8n-workflow v1.120.3 NodePropertyTypes
*
* @module constants/type-structures
* @since 2.23.0
*/
import type { NodePropertyTypes } from 'n8n-workflow';
import type { TypeStructure } from '../types/type-structures';
/**
* Complete type structure definitions for all 22 NodePropertyTypes
*
* Each entry defines:
* - type: Category (primitive/object/collection/special)
* - jsType: Underlying JavaScript type
* - description: What this type represents
* - structure: Expected data shape (for complex types)
* - example: Working example value
* - validation: Type-specific validation rules
*
* @constant
*/
export const TYPE_STRUCTURES: Record<NodePropertyTypes, TypeStructure> = {
// ============================================================================
// PRIMITIVE TYPES - Simple JavaScript values
// ============================================================================
string: {
type: 'primitive',
jsType: 'string',
description: 'A text value that can contain any characters',
example: 'Hello World',
examples: ['', 'A simple text', '{{ $json.name }}', 'https://example.com'],
validation: {
allowEmpty: true,
allowExpressions: true,
},
notes: ['Most common property type', 'Supports n8n expressions'],
},
number: {
type: 'primitive',
jsType: 'number',
description: 'A numeric value (integer or decimal)',
example: 42,
examples: [0, -10, 3.14, 100],
validation: {
allowEmpty: false,
allowExpressions: true,
},
notes: ['Can be constrained with min/max in typeOptions'],
},
boolean: {
type: 'primitive',
jsType: 'boolean',
description: 'A true/false toggle value',
example: true,
examples: [true, false],
validation: {
allowEmpty: false,
allowExpressions: false,
},
notes: ['Rendered as checkbox in n8n UI'],
},
dateTime: {
type: 'primitive',
jsType: 'string',
description: 'A date and time value in ISO 8601 format',
example: '2024-01-20T10:30:00Z',
examples: [
'2024-01-20T10:30:00Z',
'2024-01-20',
'{{ $now }}',
],
validation: {
allowEmpty: false,
allowExpressions: true,
pattern: '^\\d{4}-\\d{2}-\\d{2}(T\\d{2}:\\d{2}:\\d{2}(\\.\\d{3})?Z?)?$',
},
notes: ['Accepts ISO 8601 format', 'Can use n8n date expressions'],
},
color: {
type: 'primitive',
jsType: 'string',
description: 'A color value in hex format',
example: '#FF5733',
examples: ['#FF5733', '#000000', '#FFFFFF', '{{ $json.color }}'],
validation: {
allowEmpty: false,
allowExpressions: true,
pattern: '^#[0-9A-Fa-f]{6}$',
},
notes: ['Must be 6-digit hex color', 'Rendered with color picker in UI'],
},
json: {
type: 'primitive',
jsType: 'string',
description: 'A JSON string that can be parsed into any structure',
example: '{"key": "value", "nested": {"data": 123}}',
examples: [
'{}',
'{"name": "John", "age": 30}',
'[1, 2, 3]',
'{{ $json }}',
],
validation: {
allowEmpty: false,
allowExpressions: true,
},
notes: ['Must be valid JSON when parsed', 'Often used for custom payloads'],
},
// ============================================================================
// OPTION TYPES - Selection from predefined choices
// ============================================================================
options: {
type: 'primitive',
jsType: 'string',
description: 'Single selection from a list of predefined options',
example: 'option1',
examples: ['GET', 'POST', 'channelMessage', 'update'],
validation: {
allowEmpty: false,
allowExpressions: false,
},
notes: [
'Value must match one of the defined option values',
'Rendered as dropdown in UI',
'Options defined in property.options array',
],
},
multiOptions: {
type: 'array',
jsType: 'array',
description: 'Multiple selections from a list of predefined options',
structure: {
items: {
type: 'string',
description: 'Selected option value',
},
},
example: ['option1', 'option2'],
examples: [[], ['GET', 'POST'], ['read', 'write', 'delete']],
validation: {
allowEmpty: true,
allowExpressions: false,
},
notes: [
'Array of option values',
'Each value must exist in property.options',
'Rendered as multi-select dropdown',
],
},
// ============================================================================
// COLLECTION TYPES - Complex nested structures
// ============================================================================
collection: {
type: 'collection',
jsType: 'object',
description: 'A group of related properties with dynamic values',
structure: {
properties: {
'<propertyName>': {
type: 'any',
description: 'Any nested property from the collection definition',
},
},
flexible: true,
},
example: {
name: 'John Doe',
email: 'john@example.com',
age: 30,
},
examples: [
{},
{ key1: 'value1', key2: 123 },
{ nested: { deep: { value: true } } },
],
validation: {
allowEmpty: true,
allowExpressions: true,
},
notes: [
'Properties defined in property.values array',
'Each property can be any type',
'UI renders as expandable section',
],
},
fixedCollection: {
type: 'collection',
jsType: 'object',
description: 'A collection with predefined groups of properties',
structure: {
properties: {
'<collectionName>': {
type: 'array',
description: 'Array of collection items',
items: {
type: 'object',
description: 'Collection item with defined properties',
},
},
},
required: [],
},
example: {
headers: [
{ name: 'Content-Type', value: 'application/json' },
{ name: 'Authorization', value: 'Bearer token' },
],
},
examples: [
{},
{ queryParameters: [{ name: 'id', value: '123' }] },
{
headers: [{ name: 'Accept', value: '*/*' }],
queryParameters: [{ name: 'limit', value: '10' }],
},
],
validation: {
allowEmpty: true,
allowExpressions: true,
},
notes: [
'Each collection has predefined structure',
'Often used for headers, parameters, etc.',
'Supports multiple values per collection',
],
},
// ============================================================================
// SPECIAL n8n TYPES - Advanced functionality
// ============================================================================
resourceLocator: {
type: 'special',
jsType: 'object',
description: 'A flexible way to specify a resource by ID, name, URL, or list',
structure: {
properties: {
mode: {
type: 'string',
description: 'How the resource is specified',
enum: ['id', 'url', 'list'],
required: true,
},
value: {
type: 'string',
description: 'The resource identifier',
required: true,
},
},
required: ['mode', 'value'],
},
example: {
mode: 'id',
value: 'abc123',
},
examples: [
{ mode: 'url', value: 'https://example.com/resource/123' },
{ mode: 'list', value: 'item-from-dropdown' },
{ mode: 'id', value: '{{ $json.resourceId }}' },
],
validation: {
allowEmpty: false,
allowExpressions: true,
},
notes: [
'Provides flexible resource selection',
'Mode determines how value is interpreted',
'UI adapts based on selected mode',
],
},
resourceMapper: {
type: 'special',
jsType: 'object',
description: 'Maps input data fields to resource fields with transformation options',
structure: {
properties: {
mappingMode: {
type: 'string',
description: 'How fields are mapped',
enum: ['defineBelow', 'autoMapInputData'],
},
value: {
type: 'object',
description: 'Field mappings',
properties: {
'<fieldName>': {
type: 'string',
description: 'Expression or value for this field',
},
},
flexible: true,
},
},
},
example: {
mappingMode: 'defineBelow',
value: {
name: '{{ $json.fullName }}',
email: '{{ $json.emailAddress }}',
status: 'active',
},
},
examples: [
{ mappingMode: 'autoMapInputData', value: {} },
{
mappingMode: 'defineBelow',
value: { id: '{{ $json.userId }}', name: '{{ $json.name }}' },
},
],
validation: {
allowEmpty: false,
allowExpressions: true,
},
notes: [
'Complex mapping with UI assistance',
'Can auto-map or manually define',
'Supports field transformations',
],
},
filter: {
type: 'special',
jsType: 'object',
description: 'Defines conditions for filtering data with boolean logic',
structure: {
properties: {
conditions: {
type: 'array',
description: 'Array of filter conditions',
items: {
type: 'object',
properties: {
id: {
type: 'string',
description: 'Unique condition identifier',
required: true,
},
leftValue: {
type: 'any',
description: 'Left side of comparison',
},
operator: {
type: 'object',
description: 'Comparison operator',
required: true,
properties: {
type: {
type: 'string',
enum: ['string', 'number', 'boolean', 'dateTime', 'array', 'object'],
required: true,
},
operation: {
type: 'string',
description: 'Operation to perform',
required: true,
},
},
},
rightValue: {
type: 'any',
description: 'Right side of comparison',
},
},
},
required: true,
},
combinator: {
type: 'string',
description: 'How to combine conditions',
enum: ['and', 'or'],
required: true,
},
},
required: ['conditions', 'combinator'],
},
example: {
conditions: [
{
id: 'abc-123',
leftValue: '{{ $json.status }}',
operator: { type: 'string', operation: 'equals' },
rightValue: 'active',
},
],
combinator: 'and',
},
validation: {
allowEmpty: false,
allowExpressions: true,
},
notes: [
'Advanced filtering UI in n8n',
'Supports complex boolean logic',
'Operations vary by data type',
],
},
assignmentCollection: {
type: 'special',
jsType: 'object',
description: 'Defines variable assignments with expressions',
structure: {
properties: {
assignments: {
type: 'array',
description: 'Array of variable assignments',
items: {
type: 'object',
properties: {
id: {
type: 'string',
description: 'Unique assignment identifier',
required: true,
},
name: {
type: 'string',
description: 'Variable name',
required: true,
},
value: {
type: 'any',
description: 'Value to assign',
required: true,
},
type: {
type: 'string',
description: 'Data type of the value',
enum: ['string', 'number', 'boolean', 'array', 'object'],
},
},
},
required: true,
},
},
required: ['assignments'],
},
example: {
assignments: [
{
id: 'abc-123',
name: 'userName',
value: '{{ $json.name }}',
type: 'string',
},
{
id: 'def-456',
name: 'userAge',
value: 30,
type: 'number',
},
],
},
validation: {
allowEmpty: false,
allowExpressions: true,
},
notes: [
'Used in Set node and similar',
'Each assignment can use expressions',
'Type helps with validation',
],
},
// ============================================================================
// CREDENTIAL TYPES - Authentication and credentials
// ============================================================================
credentials: {
type: 'special',
jsType: 'string',
description: 'Reference to credential configuration',
example: 'googleSheetsOAuth2Api',
examples: ['httpBasicAuth', 'slackOAuth2Api', 'postgresApi'],
validation: {
allowEmpty: false,
allowExpressions: false,
},
notes: [
'References credential type name',
'Credential must be configured in n8n',
'Type name matches credential definition',
],
},
credentialsSelect: {
type: 'special',
jsType: 'string',
description: 'Dropdown to select from available credentials',
example: 'credential-id-123',
examples: ['cred-abc', 'cred-def', '{{ $credentials.id }}'],
validation: {
allowEmpty: false,
allowExpressions: true,
},
notes: [
'User selects from configured credentials',
'Returns credential ID',
'Used when multiple credential instances exist',
],
},
// ============================================================================
// UI-ONLY TYPES - Display elements without data
// ============================================================================
hidden: {
type: 'special',
jsType: 'string',
description: 'Hidden property not shown in UI (used for internal logic)',
example: '',
validation: {
allowEmpty: true,
allowExpressions: true,
},
notes: [
'Not rendered in UI',
'Can store metadata or computed values',
'Often used for version tracking',
],
},
button: {
type: 'special',
jsType: 'string',
description: 'Clickable button that triggers an action',
example: '',
validation: {
allowEmpty: true,
allowExpressions: false,
},
notes: [
'Triggers action when clicked',
'Does not store a value',
'Action defined in routing property',
],
},
callout: {
type: 'special',
jsType: 'string',
description: 'Informational message box (warning, info, success, error)',
example: '',
validation: {
allowEmpty: true,
allowExpressions: false,
},
notes: [
'Display-only, no value stored',
'Used for warnings and hints',
'Style controlled by typeOptions',
],
},
notice: {
type: 'special',
jsType: 'string',
description: 'Notice message displayed to user',
example: '',
validation: {
allowEmpty: true,
allowExpressions: false,
},
notes: ['Similar to callout', 'Display-only element', 'Provides contextual information'],
},
// ============================================================================
// UTILITY TYPES - Special-purpose functionality
// ============================================================================
workflowSelector: {
type: 'special',
jsType: 'string',
description: 'Dropdown to select another workflow',
example: 'workflow-123',
examples: ['wf-abc', '{{ $json.workflowId }}'],
validation: {
allowEmpty: false,
allowExpressions: true,
},
notes: [
'Selects from available workflows',
'Returns workflow ID',
'Used in Execute Workflow node',
],
},
curlImport: {
type: 'special',
jsType: 'string',
description: 'Import configuration from cURL command',
example: 'curl -X GET https://api.example.com/data',
validation: {
allowEmpty: true,
allowExpressions: false,
},
notes: [
'Parses cURL command to populate fields',
'Used in HTTP Request node',
'One-time import feature',
],
},
};
/**
* Real-world examples for complex types
*
* These examples come from actual n8n workflows and demonstrate
* correct usage patterns for complex property types.
*
* @constant
*/
export const COMPLEX_TYPE_EXAMPLES = {
collection: {
basic: {
name: 'John Doe',
email: 'john@example.com',
},
nested: {
user: {
firstName: 'Jane',
lastName: 'Smith',
},
preferences: {
theme: 'dark',
notifications: true,
},
},
withExpressions: {
id: '{{ $json.userId }}',
timestamp: '{{ $now }}',
data: '{{ $json.payload }}',
},
},
fixedCollection: {
httpHeaders: {
headers: [
{ name: 'Content-Type', value: 'application/json' },
{ name: 'Authorization', value: 'Bearer {{ $credentials.token }}' },
],
},
queryParameters: {
queryParameters: [
{ name: 'page', value: '1' },
{ name: 'limit', value: '100' },
],
},
multipleCollections: {
headers: [{ name: 'Accept', value: 'application/json' }],
queryParameters: [{ name: 'filter', value: 'active' }],
},
},
filter: {
simple: {
conditions: [
{
id: '1',
leftValue: '{{ $json.status }}',
operator: { type: 'string', operation: 'equals' },
rightValue: 'active',
},
],
combinator: 'and',
},
complex: {
conditions: [
{
id: '1',
leftValue: '{{ $json.age }}',
operator: { type: 'number', operation: 'gt' },
rightValue: 18,
},
{
id: '2',
leftValue: '{{ $json.country }}',
operator: { type: 'string', operation: 'equals' },
rightValue: 'US',
},
],
combinator: 'and',
},
},
resourceMapper: {
autoMap: {
mappingMode: 'autoMapInputData',
value: {},
},
manual: {
mappingMode: 'defineBelow',
value: {
firstName: '{{ $json.first_name }}',
lastName: '{{ $json.last_name }}',
email: '{{ $json.email_address }}',
status: 'active',
},
},
},
assignmentCollection: {
basic: {
assignments: [
{
id: '1',
name: 'fullName',
value: '{{ $json.firstName }} {{ $json.lastName }}',
type: 'string',
},
],
},
multiple: {
assignments: [
{ id: '1', name: 'userName', value: '{{ $json.name }}', type: 'string' },
{ id: '2', name: 'userAge', value: '{{ $json.age }}', type: 'number' },
{ id: '3', name: 'isActive', value: true, type: 'boolean' },
],
},
},
};

View File

@@ -155,22 +155,17 @@ export class SingleSessionHTTPServer {
*/
private async removeSession(sessionId: string, reason: string): Promise<void> {
try {
// Store reference to transport before deletion
const transport = this.transports[sessionId];
// Delete transport FIRST to prevent onclose handler from triggering recursion
// This breaks the circular reference: removeSession -> close -> onclose -> removeSession
delete this.transports[sessionId];
// Close transport if exists
if (this.transports[sessionId]) {
await this.transports[sessionId].close();
delete this.transports[sessionId];
}
// Remove server, metadata, and context
delete this.servers[sessionId];
delete this.sessionMetadata[sessionId];
delete this.sessionContexts[sessionId];
// Close transport AFTER deletion
// When onclose handler fires, it won't find the transport anymore
if (transport) {
await transport.close();
}
logger.info('Session removed', { sessionId, reason });
} catch (error) {
logger.warn('Error removing session', { sessionId, reason, error });

View File

@@ -365,7 +365,6 @@ const updateWorkflowSchema = z.object({
connections: z.record(z.any()).optional(),
settings: z.any().optional(),
createBackup: z.boolean().optional(),
intent: z.string().optional(),
});
const listWorkflowsSchema = z.object({
@@ -701,22 +700,15 @@ export async function handleUpdateWorkflow(
repository: NodeRepository,
context?: InstanceContext
): Promise<McpToolResponse> {
const startTime = Date.now();
const sessionId = `mutation_${Date.now()}_${Math.random().toString(36).slice(2, 11)}`;
let workflowBefore: any = null;
let userIntent = 'Full workflow update';
try {
const client = ensureApiConfigured(context);
const input = updateWorkflowSchema.parse(args);
const { id, createBackup, intent, ...updateData } = input;
userIntent = intent || 'Full workflow update';
const { id, createBackup, ...updateData } = input;
// If nodes/connections are being updated, validate the structure
if (updateData.nodes || updateData.connections) {
// Always fetch current workflow for validation (need all fields like name)
const current = await client.getWorkflow(id);
workflowBefore = JSON.parse(JSON.stringify(current));
// Create backup before modifying workflow (default: true)
if (createBackup !== false) {
@@ -759,46 +751,13 @@ export async function handleUpdateWorkflow(
// Update workflow
const workflow = await client.updateWorkflow(id, updateData);
// Track successful mutation
if (workflowBefore) {
trackWorkflowMutationForFullUpdate({
sessionId,
toolName: 'n8n_update_full_workflow',
userIntent,
operations: [], // Full update doesn't use diff operations
workflowBefore,
workflowAfter: workflow,
mutationSuccess: true,
durationMs: Date.now() - startTime,
}).catch(err => {
logger.warn('Failed to track mutation telemetry:', err);
});
}
return {
success: true,
data: workflow,
message: `Workflow "${workflow.name}" updated successfully`
};
} catch (error) {
// Track failed mutation
if (workflowBefore) {
trackWorkflowMutationForFullUpdate({
sessionId,
toolName: 'n8n_update_full_workflow',
userIntent,
operations: [],
workflowBefore,
workflowAfter: workflowBefore, // No change since it failed
mutationSuccess: false,
mutationError: error instanceof Error ? error.message : 'Unknown error',
durationMs: Date.now() - startTime,
}).catch(err => {
logger.warn('Failed to track mutation telemetry for failed operation:', err);
});
}
if (error instanceof z.ZodError) {
return {
success: false,
@@ -806,7 +765,7 @@ export async function handleUpdateWorkflow(
details: { errors: error.errors }
};
}
if (error instanceof N8nApiError) {
return {
success: false,
@@ -815,7 +774,7 @@ export async function handleUpdateWorkflow(
details: error.details as Record<string, unknown> | undefined
};
}
return {
success: false,
error: error instanceof Error ? error.message : 'Unknown error occurred'
@@ -823,19 +782,6 @@ export async function handleUpdateWorkflow(
}
}
/**
* Track workflow mutation for telemetry (full workflow updates)
*/
async function trackWorkflowMutationForFullUpdate(data: any): Promise<void> {
try {
const { telemetry } = await import('../telemetry/telemetry-manager.js');
await telemetry.trackWorkflowMutation(data);
} catch (error) {
// Silently fail - telemetry should never break core functionality
logger.debug('Telemetry tracking failed:', error);
}
}
export async function handleDeleteWorkflow(args: unknown, context?: InstanceContext): Promise<McpToolResponse> {
try {
const client = ensureApiConfigured(context);
@@ -1615,6 +1561,7 @@ export async function handleListAvailableTools(context?: InstanceContext): Promi
maxRetries: config.maxRetries
} : null,
limitations: [
'Cannot activate/deactivate workflows via API',
'Cannot execute workflows directly (must use webhooks)',
'Cannot stop running executions',
'Tags and credentials have limited API support'

View File

@@ -14,22 +14,6 @@ import { InstanceContext } from '../types/instance-context';
import { validateWorkflowStructure } from '../services/n8n-validation';
import { NodeRepository } from '../database/node-repository';
import { WorkflowVersioningService } from '../services/workflow-versioning-service';
import { WorkflowValidator } from '../services/workflow-validator';
import { EnhancedConfigValidator } from '../services/enhanced-config-validator';
// Cached validator instance to avoid recreating on every mutation
let cachedValidator: WorkflowValidator | null = null;
/**
* Get or create cached workflow validator instance
* Reuses the same validator to avoid redundant NodeSimilarityService initialization
*/
function getValidator(repository: NodeRepository): WorkflowValidator {
if (!cachedValidator) {
cachedValidator = new WorkflowValidator(repository, EnhancedConfigValidator);
}
return cachedValidator;
}
// Zod schema for the diff request
const workflowDiffSchema = z.object({
@@ -67,7 +51,6 @@ const workflowDiffSchema = z.object({
validateOnly: z.boolean().optional(),
continueOnError: z.boolean().optional(),
createBackup: z.boolean().optional(),
intent: z.string().optional(),
});
export async function handleUpdatePartialWorkflow(
@@ -75,26 +58,20 @@ export async function handleUpdatePartialWorkflow(
repository: NodeRepository,
context?: InstanceContext
): Promise<McpToolResponse> {
const startTime = Date.now();
const sessionId = `mutation_${Date.now()}_${Math.random().toString(36).slice(2, 11)}`;
let workflowBefore: any = null;
let validationBefore: any = null;
let validationAfter: any = null;
try {
// Debug logging (only in debug mode)
if (process.env.DEBUG_MCP === 'true') {
logger.debug('Workflow diff request received', {
argsType: typeof args,
hasWorkflowId: args && typeof args === 'object' && 'workflowId' in args,
operationCount: args && typeof args === 'object' && 'operations' in args ?
operationCount: args && typeof args === 'object' && 'operations' in args ?
(args as any).operations?.length : 0
});
}
// Validate input
const input = workflowDiffSchema.parse(args);
// Get API client
const client = getN8nApiClient(context);
if (!client) {
@@ -103,31 +80,11 @@ export async function handleUpdatePartialWorkflow(
error: 'n8n API not configured. Please set N8N_API_URL and N8N_API_KEY environment variables.'
};
}
// Fetch current workflow
let workflow;
try {
workflow = await client.getWorkflow(input.id);
// Store original workflow for telemetry
workflowBefore = JSON.parse(JSON.stringify(workflow));
// Validate workflow BEFORE mutation (for telemetry)
try {
const validator = getValidator(repository);
validationBefore = await validator.validateWorkflow(workflowBefore, {
validateNodes: true,
validateConnections: true,
validateExpressions: true,
profile: 'runtime'
});
} catch (validationError) {
logger.debug('Pre-mutation validation failed (non-blocking):', validationError);
// Don't block mutation on validation errors
validationBefore = {
valid: false,
errors: [{ type: 'validation_error', message: 'Validation failed' }]
};
}
} catch (error) {
if (error instanceof N8nApiError) {
return {
@@ -288,88 +245,15 @@ export async function handleUpdatePartialWorkflow(
// Update workflow via API
try {
const updatedWorkflow = await client.updateWorkflow(input.id, diffResult.workflow!);
// Handle activation/deactivation if requested
let finalWorkflow = updatedWorkflow;
let activationMessage = '';
// Validate workflow AFTER mutation (for telemetry)
try {
const validator = getValidator(repository);
validationAfter = await validator.validateWorkflow(finalWorkflow, {
validateNodes: true,
validateConnections: true,
validateExpressions: true,
profile: 'runtime'
});
} catch (validationError) {
logger.debug('Post-mutation validation failed (non-blocking):', validationError);
// Don't block on validation errors
validationAfter = {
valid: false,
errors: [{ type: 'validation_error', message: 'Validation failed' }]
};
}
if (diffResult.shouldActivate) {
try {
finalWorkflow = await client.activateWorkflow(input.id);
activationMessage = ' Workflow activated.';
} catch (activationError) {
logger.error('Failed to activate workflow after update', activationError);
return {
success: false,
error: 'Workflow updated successfully but activation failed',
details: {
workflowUpdated: true,
activationError: activationError instanceof Error ? activationError.message : 'Unknown error'
}
};
}
} else if (diffResult.shouldDeactivate) {
try {
finalWorkflow = await client.deactivateWorkflow(input.id);
activationMessage = ' Workflow deactivated.';
} catch (deactivationError) {
logger.error('Failed to deactivate workflow after update', deactivationError);
return {
success: false,
error: 'Workflow updated successfully but deactivation failed',
details: {
workflowUpdated: true,
deactivationError: deactivationError instanceof Error ? deactivationError.message : 'Unknown error'
}
};
}
}
// Track successful mutation
if (workflowBefore && !input.validateOnly) {
trackWorkflowMutation({
sessionId,
toolName: 'n8n_update_partial_workflow',
userIntent: input.intent || 'Partial workflow update',
operations: input.operations,
workflowBefore,
workflowAfter: finalWorkflow,
validationBefore,
validationAfter,
mutationSuccess: true,
durationMs: Date.now() - startTime,
}).catch(err => {
logger.debug('Failed to track mutation telemetry:', err);
});
}
return {
success: true,
data: finalWorkflow,
message: `Workflow "${finalWorkflow.name}" updated successfully. Applied ${diffResult.operationsApplied} operations.${activationMessage}`,
data: updatedWorkflow,
message: `Workflow "${updatedWorkflow.name}" updated successfully. Applied ${diffResult.operationsApplied} operations.`,
details: {
operationsApplied: diffResult.operationsApplied,
workflowId: finalWorkflow.id,
workflowName: finalWorkflow.name,
active: finalWorkflow.active,
workflowId: updatedWorkflow.id,
workflowName: updatedWorkflow.name,
applied: diffResult.applied,
failed: diffResult.failed,
errors: diffResult.errors,
@@ -377,25 +261,6 @@ export async function handleUpdatePartialWorkflow(
}
};
} catch (error) {
// Track failed mutation
if (workflowBefore && !input.validateOnly) {
trackWorkflowMutation({
sessionId,
toolName: 'n8n_update_partial_workflow',
userIntent: input.intent || 'Partial workflow update',
operations: input.operations,
workflowBefore,
workflowAfter: workflowBefore, // No change since it failed
validationBefore,
validationAfter: validationBefore, // Same as before since mutation failed
mutationSuccess: false,
mutationError: error instanceof Error ? error.message : 'Unknown error',
durationMs: Date.now() - startTime,
}).catch(err => {
logger.warn('Failed to track mutation telemetry for failed operation:', err);
});
}
if (error instanceof N8nApiError) {
return {
success: false,
@@ -414,7 +279,7 @@ export async function handleUpdatePartialWorkflow(
details: { errors: error.errors }
};
}
logger.error('Failed to update partial workflow', error);
return {
success: false,
@@ -423,90 +288,3 @@ export async function handleUpdatePartialWorkflow(
}
}
/**
* Infer intent from operations when not explicitly provided
*/
function inferIntentFromOperations(operations: any[]): string {
if (!operations || operations.length === 0) {
return 'Partial workflow update';
}
const opTypes = operations.map((op) => op.type);
const opCount = operations.length;
// Single operation - be specific
if (opCount === 1) {
const op = operations[0];
switch (op.type) {
case 'addNode':
return `Add ${op.node?.type || 'node'}`;
case 'removeNode':
return `Remove node ${op.nodeName || op.nodeId || ''}`.trim();
case 'updateNode':
return `Update node ${op.nodeName || op.nodeId || ''}`.trim();
case 'addConnection':
return `Connect ${op.source || 'node'} to ${op.target || 'node'}`;
case 'removeConnection':
return `Disconnect ${op.source || 'node'} from ${op.target || 'node'}`;
case 'rewireConnection':
return `Rewire ${op.source || 'node'} from ${op.from || ''} to ${op.to || ''}`.trim();
case 'updateName':
return `Rename workflow to "${op.name || ''}"`;
case 'activateWorkflow':
return 'Activate workflow';
case 'deactivateWorkflow':
return 'Deactivate workflow';
default:
return `Workflow ${op.type}`;
}
}
// Multiple operations - summarize pattern
const typeSet = new Set(opTypes);
const summary: string[] = [];
if (typeSet.has('addNode')) {
const count = opTypes.filter((t) => t === 'addNode').length;
summary.push(`add ${count} node${count > 1 ? 's' : ''}`);
}
if (typeSet.has('removeNode')) {
const count = opTypes.filter((t) => t === 'removeNode').length;
summary.push(`remove ${count} node${count > 1 ? 's' : ''}`);
}
if (typeSet.has('updateNode')) {
const count = opTypes.filter((t) => t === 'updateNode').length;
summary.push(`update ${count} node${count > 1 ? 's' : ''}`);
}
if (typeSet.has('addConnection') || typeSet.has('rewireConnection')) {
summary.push('modify connections');
}
if (typeSet.has('updateName') || typeSet.has('updateSettings')) {
summary.push('update metadata');
}
return summary.length > 0
? `Workflow update: ${summary.join(', ')}`
: `Workflow update: ${opCount} operations`;
}
/**
* Track workflow mutation for telemetry
*/
async function trackWorkflowMutation(data: any): Promise<void> {
try {
// Enhance intent if it's missing or generic
if (
!data.userIntent ||
data.userIntent === 'Partial workflow update' ||
data.userIntent.length < 10
) {
data.userIntent = inferIntentFromOperations(data.operations);
}
const { telemetry } = await import('../telemetry/telemetry-manager.js');
await telemetry.trackWorkflowMutation(data);
} catch (error) {
logger.debug('Telemetry tracking failed:', error);
}
}

View File

@@ -70,7 +70,6 @@ export class N8NDocumentationMCPServer {
private previousTool: string | null = null;
private previousToolTimestamp: number = Date.now();
private earlyLogger: EarlyErrorLogger | null = null;
private disabledToolsCache: Set<string> | null = null;
constructor(instanceContext?: InstanceContext, earlyLogger?: EarlyErrorLogger) {
this.instanceContext = instanceContext;
@@ -324,52 +323,6 @@ export class N8NDocumentationMCPServer {
}
}
/**
* Parse and cache disabled tools from DISABLED_TOOLS environment variable.
* Returns a Set of tool names that should be filtered from registration.
*
* Cached after first call since environment variables don't change at runtime.
* Includes safety limits: max 10KB env var length, max 200 tools.
*
* @returns Set of disabled tool names
*/
private getDisabledTools(): Set<string> {
// Return cached value if available
if (this.disabledToolsCache !== null) {
return this.disabledToolsCache;
}
let disabledToolsEnv = process.env.DISABLED_TOOLS || '';
if (!disabledToolsEnv) {
this.disabledToolsCache = new Set();
return this.disabledToolsCache;
}
// Safety limit: prevent abuse with very long environment variables
if (disabledToolsEnv.length > 10000) {
logger.warn(`DISABLED_TOOLS environment variable too long (${disabledToolsEnv.length} chars), truncating to 10000`);
disabledToolsEnv = disabledToolsEnv.substring(0, 10000);
}
let tools = disabledToolsEnv
.split(',')
.map(t => t.trim())
.filter(Boolean);
// Safety limit: prevent abuse with too many tools
if (tools.length > 200) {
logger.warn(`DISABLED_TOOLS contains ${tools.length} tools, limiting to first 200`);
tools = tools.slice(0, 200);
}
if (tools.length > 0) {
logger.info(`Disabled tools configured: ${tools.join(', ')}`);
}
this.disabledToolsCache = new Set(tools);
return this.disabledToolsCache;
}
private setupHandlers(): void {
// Handle initialization
this.server.setRequestHandler(InitializeRequestSchema, async (request) => {
@@ -423,16 +376,8 @@ export class N8NDocumentationMCPServer {
// Handle tool listing
this.server.setRequestHandler(ListToolsRequestSchema, async (request) => {
// Get disabled tools from environment variable
const disabledTools = this.getDisabledTools();
// Filter documentation tools based on disabled list
const enabledDocTools = n8nDocumentationToolsFinal.filter(
tool => !disabledTools.has(tool.name)
);
// Combine documentation tools with management tools if API is configured
let tools = [...enabledDocTools];
let tools = [...n8nDocumentationToolsFinal];
// Check if n8n API tools should be available
// 1. Environment variables (backward compatibility)
@@ -445,31 +390,19 @@ export class N8NDocumentationMCPServer {
const shouldIncludeManagementTools = hasEnvConfig || hasInstanceConfig || isMultiTenantEnabled;
if (shouldIncludeManagementTools) {
// Filter management tools based on disabled list
const enabledMgmtTools = n8nManagementTools.filter(
tool => !disabledTools.has(tool.name)
);
tools.push(...enabledMgmtTools);
logger.debug(`Tool listing: ${tools.length} tools available (${enabledDocTools.length} documentation + ${enabledMgmtTools.length} management)`, {
tools.push(...n8nManagementTools);
logger.debug(`Tool listing: ${tools.length} tools available (${n8nDocumentationToolsFinal.length} documentation + ${n8nManagementTools.length} management)`, {
hasEnvConfig,
hasInstanceConfig,
isMultiTenantEnabled,
disabledToolsCount: disabledTools.size
isMultiTenantEnabled
});
} else {
logger.debug(`Tool listing: ${tools.length} tools available (documentation only)`, {
hasEnvConfig,
hasInstanceConfig,
isMultiTenantEnabled,
disabledToolsCount: disabledTools.size
isMultiTenantEnabled
});
}
// Log filtered tools count if any tools are disabled
if (disabledTools.size > 0) {
const totalAvailableTools = n8nDocumentationToolsFinal.length + (shouldIncludeManagementTools ? n8nManagementTools.length : 0);
logger.debug(`Filtered ${disabledTools.size} disabled tools, ${tools.length}/${totalAvailableTools} tools available`);
}
// Check if client is n8n (from initialization)
const clientInfo = this.clientInfo;
@@ -510,23 +443,7 @@ export class N8NDocumentationMCPServer {
configType: args && args.config ? typeof args.config : 'N/A',
rawRequest: JSON.stringify(request.params)
});
// Check if tool is disabled via DISABLED_TOOLS environment variable
const disabledTools = this.getDisabledTools();
if (disabledTools.has(name)) {
logger.warn(`Attempted to call disabled tool: ${name}`);
return {
content: [{
type: 'text',
text: JSON.stringify({
error: 'TOOL_DISABLED',
message: `Tool '${name}' is not available in this deployment. It has been disabled via DISABLED_TOOLS environment variable.`,
tool: name
}, null, 2)
}]
};
}
// Workaround for n8n's nested output bug
// Check if args contains nested 'output' structure from n8n's memory corruption
let processedArgs = args;
@@ -928,27 +845,19 @@ export class N8NDocumentationMCPServer {
async executeTool(name: string, args: any): Promise<any> {
// Ensure args is an object and validate it
args = args || {};
// Defense in depth: This should never be reached since CallToolRequestSchema
// handler already checks disabled tools (line 514-528), but we guard here
// in case of future refactoring or direct executeTool() calls
const disabledTools = this.getDisabledTools();
if (disabledTools.has(name)) {
throw new Error(`Tool '${name}' is disabled via DISABLED_TOOLS environment variable`);
}
// Log the tool call for debugging n8n issues
logger.info(`Tool execution: ${name}`, {
logger.info(`Tool execution: ${name}`, {
args: typeof args === 'object' ? JSON.stringify(args) : args,
argsType: typeof args,
argsKeys: typeof args === 'object' ? Object.keys(args) : 'not-object'
});
// Validate that args is actually an object
if (typeof args !== 'object' || args === null) {
throw new Error(`Invalid arguments for tool ${name}: expected object, got ${typeof args}`);
}
switch (name) {
case 'tools_documentation':
// No required parameters

View File

@@ -9,7 +9,6 @@ export const n8nUpdateFullWorkflowDoc: ToolDocumentation = {
example: 'n8n_update_full_workflow({id: "wf_123", nodes: [...], connections: {...}})',
performance: 'Network-dependent',
tips: [
'Include intent parameter in every call - helps to return better responses',
'Must provide complete workflow',
'Use update_partial for small changes',
'Validate before updating'
@@ -22,15 +21,13 @@ export const n8nUpdateFullWorkflowDoc: ToolDocumentation = {
name: { type: 'string', description: 'New workflow name (optional)' },
nodes: { type: 'array', description: 'Complete array of workflow nodes (required if modifying structure)' },
connections: { type: 'object', description: 'Complete connections object (required if modifying structure)' },
settings: { type: 'object', description: 'Workflow settings to update (timezone, error handling, etc.)' },
intent: { type: 'string', description: 'Intent of the change - helps to return better response. Include in every tool call. Example: "Migrate workflow to new node versions".' }
settings: { type: 'object', description: 'Workflow settings to update (timezone, error handling, etc.)' }
},
returns: 'Updated workflow object with all fields including the changes applied',
examples: [
'n8n_update_full_workflow({id: "abc", intent: "Rename workflow for clarity", name: "New Name"}) - Rename with intent',
'n8n_update_full_workflow({id: "abc", name: "New Name"}) - Rename only',
'n8n_update_full_workflow({id: "xyz", intent: "Add error handling nodes", nodes: [...], connections: {...}}) - Full structure update',
'const wf = n8n_get_workflow({id}); wf.nodes.push(newNode); n8n_update_full_workflow({...wf, intent: "Add data processing node"}); // Add node'
'n8n_update_full_workflow({id: "xyz", nodes: [...], connections: {...}}) - Full structure update',
'const wf = n8n_get_workflow({id}); wf.nodes.push(newNode); n8n_update_full_workflow(wf); // Add node'
],
useCases: [
'Major workflow restructuring',
@@ -41,7 +38,6 @@ export const n8nUpdateFullWorkflowDoc: ToolDocumentation = {
],
performance: 'Network-dependent - typically 200-500ms. Larger workflows take longer. Consider update_partial for better performance.',
bestPractices: [
'Always include intent parameter - it helps provide better responses',
'Get workflow first, modify, then update',
'Validate with validate_workflow before updating',
'Use update_partial for small changes',

View File

@@ -4,13 +4,11 @@ export const n8nUpdatePartialWorkflowDoc: ToolDocumentation = {
name: 'n8n_update_partial_workflow',
category: 'workflow_management',
essentials: {
description: 'Update workflow incrementally with diff operations. Types: addNode, removeNode, updateNode, moveNode, enable/disableNode, addConnection, removeConnection, rewireConnection, cleanStaleConnections, replaceConnections, updateSettings, updateName, add/removeTag, activateWorkflow, deactivateWorkflow. Supports smart parameters (branch, case) for multi-output nodes. Full support for AI connections (ai_languageModel, ai_tool, ai_memory, ai_embedding, ai_vectorStore, ai_document, ai_textSplitter, ai_outputParser).',
description: 'Update workflow incrementally with diff operations. Types: addNode, removeNode, updateNode, moveNode, enable/disableNode, addConnection, removeConnection, rewireConnection, cleanStaleConnections, replaceConnections, updateSettings, updateName, add/removeTag. Supports smart parameters (branch, case) for multi-output nodes. Full support for AI connections (ai_languageModel, ai_tool, ai_memory, ai_embedding, ai_vectorStore, ai_document, ai_textSplitter, ai_outputParser).',
keyParameters: ['id', 'operations', 'continueOnError'],
example: 'n8n_update_partial_workflow({id: "wf_123", operations: [{type: "rewireConnection", source: "IF", from: "Old", to: "New", branch: "true"}]})',
performance: 'Fast (50-200ms)',
tips: [
'ALWAYS provide intent parameter describing what you\'re doing (e.g., "Add error handling", "Fix webhook URL", "Connect Slack to error output")',
'DON\'T use generic intent like "update workflow" or "partial update" - be specific about your goal',
'Use rewireConnection to change connection targets',
'Use branch="true"/"false" for IF nodes',
'Use case=N for Switch nodes',
@@ -21,12 +19,11 @@ export const n8nUpdatePartialWorkflowDoc: ToolDocumentation = {
'For AI connections, specify sourceOutput type (ai_languageModel, ai_tool, etc.)',
'Batch AI component connections for atomic updates',
'Auto-sanitization: ALL nodes auto-fixed during updates (operator structures, missing metadata)',
'Node renames automatically update all connection references - no manual connection operations needed',
'Activate/deactivate workflows: Use activateWorkflow/deactivateWorkflow operations (requires activatable triggers like webhook/schedule)'
'Node renames automatically update all connection references - no manual connection operations needed'
]
},
full: {
description: `Updates workflows using surgical diff operations instead of full replacement. Supports 17 operation types for precise modifications. Operations are validated and applied atomically by default - all succeed or none are applied.
description: `Updates workflows using surgical diff operations instead of full replacement. Supports 15 operation types for precise modifications. Operations are validated and applied atomically by default - all succeed or none are applied.
## Available Operations:
@@ -51,10 +48,6 @@ export const n8nUpdatePartialWorkflowDoc: ToolDocumentation = {
- **addTag**: Add a workflow tag
- **removeTag**: Remove a workflow tag
### Workflow Activation Operations (2 types):
- **activateWorkflow**: Activate the workflow to enable automatic execution via triggers
- **deactivateWorkflow**: Deactivate the workflow to prevent automatic execution
## Smart Parameters for Multi-Output Nodes
For **IF nodes**, use semantic 'branch' parameter instead of technical sourceIndex:
@@ -310,12 +303,10 @@ n8n_update_partial_workflow({
description: 'Array of diff operations. Each must have "type" field and operation-specific properties. Nodes can be referenced by ID or name.'
},
validateOnly: { type: 'boolean', description: 'If true, only validate operations without applying them' },
continueOnError: { type: 'boolean', description: 'If true, apply valid operations even if some fail (best-effort mode). Returns applied and failed operation indices. Default: false (atomic)' },
intent: { type: 'string', description: 'Intent of the change - helps to return better response. Include in every tool call. Example: "Add error handling for API failures".' }
continueOnError: { type: 'boolean', description: 'If true, apply valid operations even if some fail (best-effort mode). Returns applied and failed operation indices. Default: false (atomic)' }
},
returns: 'Updated workflow object or validation results if validateOnly=true',
examples: [
'// Include intent parameter for better responses\nn8n_update_partial_workflow({id: "abc", intent: "Add error handling for API failures", operations: [{type: "addConnection", source: "HTTP Request", target: "Error Handler"}]})',
'// Add a basic node (minimal configuration)\nn8n_update_partial_workflow({id: "abc", operations: [{type: "addNode", node: {name: "Process Data", type: "n8n-nodes-base.set", position: [400, 300], parameters: {}}}]})',
'// Add node with full configuration\nn8n_update_partial_workflow({id: "def", operations: [{type: "addNode", node: {name: "Send Slack Alert", type: "n8n-nodes-base.slack", position: [600, 300], typeVersion: 2, parameters: {resource: "message", operation: "post", channel: "#alerts", text: "Success!"}}}]})',
'// Add node AND connect it (common pattern)\nn8n_update_partial_workflow({id: "ghi", operations: [\n {type: "addNode", node: {name: "HTTP Request", type: "n8n-nodes-base.httpRequest", position: [400, 300], parameters: {url: "https://api.example.com", method: "GET"}}},\n {type: "addConnection", source: "Webhook", target: "HTTP Request"}\n]})',
@@ -368,7 +359,6 @@ n8n_update_partial_workflow({
],
performance: 'Very fast - typically 50-200ms. Much faster than full updates as only changes are processed.',
bestPractices: [
'Always include intent parameter with specific description (e.g., "Add error handling to HTTP Request node", "Fix authentication flow", "Connect Slack notification to errors"). Avoid generic phrases like "update workflow" or "partial update"',
'Use rewireConnection instead of remove+add for changing targets',
'Use branch="true"/"false" for IF nodes instead of sourceIndex',
'Use case=N for Switch nodes instead of sourceIndex',

View File

@@ -84,21 +84,19 @@ When working with Code nodes, always start by calling the relevant guide:
## Standard Workflow Pattern
⚠️ **CRITICAL**: Always call get_node_essentials() FIRST before configuring any node!
1. **Find** the node you need:
- search_nodes({query: "slack"}) - Search by keyword
- list_nodes({category: "communication"}) - List by category
- list_ai_tools() - List AI-capable nodes
2. **Configure** the node (ALWAYS START WITH ESSENTIALS):
- get_node_essentials("nodes-base.slack") - Get essential properties FIRST (5KB, shows required fields)
- get_node_info("nodes-base.slack") - Get complete schema only if essentials insufficient (100KB+)
2. **Configure** the node:
- get_node_essentials("nodes-base.slack") - Get essential properties only (5KB)
- get_node_info("nodes-base.slack") - Get complete schema (100KB+)
- search_node_properties("nodes-base.slack", "auth") - Find specific properties
3. **Validate** before deployment:
- validate_node_minimal("nodes-base.slack", config) - Check required fields (includes automatic structure validation)
- validate_node_operation("nodes-base.slack", config) - Full validation with fixes (includes automatic structure validation)
- validate_node_minimal("nodes-base.slack", config) - Check required fields
- validate_node_operation("nodes-base.slack", config) - Full validation with fixes
- validate_workflow(workflow) - Validate entire workflow
## Tool Categories
@@ -109,14 +107,14 @@ When working with Code nodes, always start by calling the relevant guide:
- list_ai_tools - List all AI-capable nodes with usage guidance
**Configuration Tools**
- get_node_essentials - ✅ CALL THIS FIRST! Returns 10-20 key properties with examples and required fields
- get_node_info - Returns complete node schema (only use if essentials is insufficient)
- get_node_essentials - Returns 10-20 key properties with examples
- get_node_info - Returns complete node schema with all properties
- search_node_properties - Search for specific properties within a node
- get_property_dependencies - Analyze property visibility dependencies
**Validation Tools**
- validate_node_minimal - Quick validation of required fields (includes structure validation)
- validate_node_operation - Full validation with operation awareness (includes structure validation)
- validate_node_minimal - Quick validation of required fields only
- validate_node_operation - Full validation with operation awareness
- validate_workflow - Complete workflow validation including connections
**Template Tools**

View File

@@ -1,151 +0,0 @@
/**
* Test telemetry mutations with enhanced logging
* Verifies that mutations are properly tracked and persisted
*/
import { telemetry } from '../telemetry/telemetry-manager.js';
import { TelemetryConfigManager } from '../telemetry/config-manager.js';
import { logger } from '../utils/logger.js';
async function testMutations() {
console.log('Starting verbose telemetry mutation test...\n');
const configManager = TelemetryConfigManager.getInstance();
console.log('Telemetry config is enabled:', configManager.isEnabled());
console.log('Telemetry config file:', configManager['configPath']);
// Test data with valid workflow structure
const testMutation = {
sessionId: 'test_session_' + Date.now(),
toolName: 'n8n_update_partial_workflow',
userIntent: 'Add a Merge node for data consolidation',
operations: [
{
type: 'addNode',
nodeId: 'Merge1',
node: {
id: 'Merge1',
type: 'n8n-nodes-base.merge',
name: 'Merge',
position: [600, 200],
parameters: {}
}
},
{
type: 'addConnection',
source: 'previous_node',
target: 'Merge1'
}
],
workflowBefore: {
id: 'test-workflow',
name: 'Test Workflow',
active: true,
nodes: [
{
id: 'previous_node',
type: 'n8n-nodes-base.manualTrigger',
name: 'When called',
position: [300, 200],
parameters: {}
}
],
connections: {},
nodeIds: []
},
workflowAfter: {
id: 'test-workflow',
name: 'Test Workflow',
active: true,
nodes: [
{
id: 'previous_node',
type: 'n8n-nodes-base.manualTrigger',
name: 'When called',
position: [300, 200],
parameters: {}
},
{
id: 'Merge1',
type: 'n8n-nodes-base.merge',
name: 'Merge',
position: [600, 200],
parameters: {}
}
],
connections: {
'previous_node': [
{
node: 'Merge1',
type: 'main',
index: 0,
source: 0,
destination: 0
}
]
},
nodeIds: []
},
mutationSuccess: true,
durationMs: 125
};
console.log('\nTest Mutation Data:');
console.log('==================');
console.log(JSON.stringify({
intent: testMutation.userIntent,
tool: testMutation.toolName,
operationCount: testMutation.operations.length,
sessionId: testMutation.sessionId
}, null, 2));
console.log('\n');
// Call trackWorkflowMutation
console.log('Calling telemetry.trackWorkflowMutation...');
try {
await telemetry.trackWorkflowMutation(testMutation);
console.log('✓ trackWorkflowMutation completed successfully\n');
} catch (error) {
console.error('✗ trackWorkflowMutation failed:', error);
console.error('\n');
}
// Check queue size before flush
const metricsBeforeFlush = telemetry.getMetrics();
console.log('Metrics before flush:');
console.log('- mutationQueueSize:', metricsBeforeFlush.tracking.mutationQueueSize);
console.log('- eventsTracked:', metricsBeforeFlush.processing.eventsTracked);
console.log('- eventsFailed:', metricsBeforeFlush.processing.eventsFailed);
console.log('\n');
// Flush telemetry with 10-second wait for Supabase
console.log('Flushing telemetry (waiting 10 seconds for Supabase)...');
try {
await telemetry.flush();
console.log('✓ Telemetry flush completed\n');
} catch (error) {
console.error('✗ Flush failed:', error);
console.error('\n');
}
// Wait a bit for async operations
await new Promise(resolve => setTimeout(resolve, 2000));
// Get final metrics
const metricsAfterFlush = telemetry.getMetrics();
console.log('Metrics after flush:');
console.log('- mutationQueueSize:', metricsAfterFlush.tracking.mutationQueueSize);
console.log('- eventsTracked:', metricsAfterFlush.processing.eventsTracked);
console.log('- eventsFailed:', metricsAfterFlush.processing.eventsFailed);
console.log('- batchesSent:', metricsAfterFlush.processing.batchesSent);
console.log('- batchesFailed:', metricsAfterFlush.processing.batchesFailed);
console.log('- circuitBreakerState:', metricsAfterFlush.processing.circuitBreakerState);
console.log('\n');
console.log('Test completed. Check workflow_mutations table in Supabase.');
}
testMutations().catch(error => {
console.error('Test failed:', error);
process.exit(1);
});

View File

@@ -1,145 +0,0 @@
/**
* Test telemetry mutations
* Verifies that mutations are properly tracked and persisted
*/
import { telemetry } from '../telemetry/telemetry-manager.js';
import { TelemetryConfigManager } from '../telemetry/config-manager.js';
async function testMutations() {
console.log('Starting telemetry mutation test...\n');
const configManager = TelemetryConfigManager.getInstance();
console.log('Telemetry Status:');
console.log('================');
console.log(configManager.getStatus());
console.log('\n');
// Get initial metrics
const metricsAfterInit = telemetry.getMetrics();
console.log('Telemetry Metrics (After Init):');
console.log('================================');
console.log(JSON.stringify(metricsAfterInit, null, 2));
console.log('\n');
// Test data mimicking actual mutation with valid workflow structure
const testMutation = {
sessionId: 'test_session_' + Date.now(),
toolName: 'n8n_update_partial_workflow',
userIntent: 'Add a Merge node for data consolidation',
operations: [
{
type: 'addNode',
nodeId: 'Merge1',
node: {
id: 'Merge1',
type: 'n8n-nodes-base.merge',
name: 'Merge',
position: [600, 200],
parameters: {}
}
},
{
type: 'addConnection',
source: 'previous_node',
target: 'Merge1'
}
],
workflowBefore: {
id: 'test-workflow',
name: 'Test Workflow',
active: true,
nodes: [
{
id: 'previous_node',
type: 'n8n-nodes-base.manualTrigger',
name: 'When called',
position: [300, 200],
parameters: {}
}
],
connections: {},
nodeIds: []
},
workflowAfter: {
id: 'test-workflow',
name: 'Test Workflow',
active: true,
nodes: [
{
id: 'previous_node',
type: 'n8n-nodes-base.manualTrigger',
name: 'When called',
position: [300, 200],
parameters: {}
},
{
id: 'Merge1',
type: 'n8n-nodes-base.merge',
name: 'Merge',
position: [600, 200],
parameters: {}
}
],
connections: {
'previous_node': [
{
node: 'Merge1',
type: 'main',
index: 0,
source: 0,
destination: 0
}
]
},
nodeIds: []
},
mutationSuccess: true,
durationMs: 125
};
console.log('Test Mutation Data:');
console.log('==================');
console.log(JSON.stringify({
intent: testMutation.userIntent,
tool: testMutation.toolName,
operationCount: testMutation.operations.length,
sessionId: testMutation.sessionId
}, null, 2));
console.log('\n');
// Call trackWorkflowMutation
console.log('Calling telemetry.trackWorkflowMutation...');
try {
await telemetry.trackWorkflowMutation(testMutation);
console.log('✓ trackWorkflowMutation completed successfully\n');
} catch (error) {
console.error('✗ trackWorkflowMutation failed:', error);
console.error('\n');
}
// Flush telemetry
console.log('Flushing telemetry...');
try {
await telemetry.flush();
console.log('✓ Telemetry flushed successfully\n');
} catch (error) {
console.error('✗ Flush failed:', error);
console.error('\n');
}
// Get final metrics
const metricsAfterFlush = telemetry.getMetrics();
console.log('Telemetry Metrics (After Flush):');
console.log('==================================');
console.log(JSON.stringify(metricsAfterFlush, null, 2));
console.log('\n');
console.log('Test completed. Check workflow_mutations table in Supabase.');
}
testMutations().catch(error => {
console.error('Test failed:', error);
process.exit(1);
});

View File

@@ -13,8 +13,6 @@ import { ResourceSimilarityService } from './resource-similarity-service';
import { NodeRepository } from '../database/node-repository';
import { DatabaseAdapter } from '../database/database-adapter';
import { NodeTypeNormalizer } from '../utils/node-type-normalizer';
import { TypeStructureService } from './type-structure-service';
import type { NodePropertyTypes } from 'n8n-workflow';
export type ValidationMode = 'full' | 'operation' | 'minimal';
export type ValidationProfile = 'strict' | 'runtime' | 'ai-friendly' | 'minimal';
@@ -113,7 +111,7 @@ export class EnhancedConfigValidator extends ConfigValidator {
this.applyProfileFilters(enhancedResult, profile);
// Add operation-specific enhancements
this.addOperationSpecificEnhancements(nodeType, config, filteredProperties, enhancedResult);
this.addOperationSpecificEnhancements(nodeType, config, enhancedResult);
// Deduplicate errors
enhancedResult.errors = this.deduplicateErrors(enhancedResult.errors);
@@ -249,7 +247,6 @@ export class EnhancedConfigValidator extends ConfigValidator {
private static addOperationSpecificEnhancements(
nodeType: string,
config: Record<string, any>,
properties: any[],
result: EnhancedValidationResult
): void {
// Type safety check - this should never happen with proper validation
@@ -266,9 +263,6 @@ export class EnhancedConfigValidator extends ConfigValidator {
// Validate resource and operation using similarity services
this.validateResourceAndOperation(nodeType, config, result);
// Validate special type structures (filter, resourceMapper, assignmentCollection, resourceLocator)
this.validateSpecialTypeStructures(config, properties, result);
// First, validate fixedCollection properties for known problematic nodes
this.validateFixedCollectionStructures(nodeType, config, result);
@@ -325,10 +319,6 @@ export class EnhancedConfigValidator extends ConfigValidator {
NodeSpecificValidators.validateMySQL(context);
break;
case 'nodes-langchain.agent':
NodeSpecificValidators.validateAIAgent(context);
break;
case 'nodes-base.set':
NodeSpecificValidators.validateSet(context);
break;
@@ -988,280 +978,4 @@ export class EnhancedConfigValidator extends ConfigValidator {
}
}
}
/**
* Validate special type structures (filter, resourceMapper, assignmentCollection, resourceLocator)
*
* Integrates TypeStructureService to validate complex property types against their
* expected structures. This catches configuration errors for advanced node types.
*
* @param config - Node configuration to validate
* @param properties - Property definitions from node schema
* @param result - Validation result to populate with errors/warnings
*/
private static validateSpecialTypeStructures(
config: Record<string, any>,
properties: any[],
result: EnhancedValidationResult
): void {
for (const [key, value] of Object.entries(config)) {
if (value === undefined || value === null) continue;
// Find property definition
const propDef = properties.find(p => p.name === key);
if (!propDef) continue;
// Check if this property uses a special type
let structureType: NodePropertyTypes | null = null;
if (propDef.type === 'filter') {
structureType = 'filter';
} else if (propDef.type === 'resourceMapper') {
structureType = 'resourceMapper';
} else if (propDef.type === 'assignmentCollection') {
structureType = 'assignmentCollection';
} else if (propDef.type === 'resourceLocator') {
structureType = 'resourceLocator';
}
if (!structureType) continue;
// Get structure definition
const structure = TypeStructureService.getStructure(structureType);
if (!structure) {
console.warn(`No structure definition found for type: ${structureType}`);
continue;
}
// Validate using TypeStructureService for basic type checking
const validationResult = TypeStructureService.validateTypeCompatibility(
value,
structureType
);
// Add errors from structure validation
if (!validationResult.valid) {
for (const error of validationResult.errors) {
result.errors.push({
type: 'invalid_configuration',
property: key,
message: error,
fix: `Ensure ${key} follows the expected structure for ${structureType} type. Example: ${JSON.stringify(structure.example)}`
});
}
}
// Add warnings
for (const warning of validationResult.warnings) {
result.warnings.push({
type: 'best_practice',
property: key,
message: warning
});
}
// Perform deep structure validation for complex types
if (typeof value === 'object' && value !== null) {
this.validateComplexTypeStructure(key, value, structureType, structure, result);
}
// Special handling for filter operation validation
if (structureType === 'filter' && value.conditions) {
this.validateFilterOperations(value.conditions, key, result);
}
}
}
/**
* Deep validation for complex type structures
*/
private static validateComplexTypeStructure(
propertyName: string,
value: any,
type: NodePropertyTypes,
structure: any,
result: EnhancedValidationResult
): void {
switch (type) {
case 'filter':
// Validate filter structure: must have combinator and conditions
if (!value.combinator) {
result.errors.push({
type: 'invalid_configuration',
property: `${propertyName}.combinator`,
message: 'Filter must have a combinator field',
fix: 'Add combinator: "and" or combinator: "or" to the filter configuration'
});
} else if (value.combinator !== 'and' && value.combinator !== 'or') {
result.errors.push({
type: 'invalid_configuration',
property: `${propertyName}.combinator`,
message: `Invalid combinator value: ${value.combinator}. Must be "and" or "or"`,
fix: 'Set combinator to either "and" or "or"'
});
}
if (!value.conditions) {
result.errors.push({
type: 'invalid_configuration',
property: `${propertyName}.conditions`,
message: 'Filter must have a conditions field',
fix: 'Add conditions array to the filter configuration'
});
} else if (!Array.isArray(value.conditions)) {
result.errors.push({
type: 'invalid_configuration',
property: `${propertyName}.conditions`,
message: 'Filter conditions must be an array',
fix: 'Ensure conditions is an array of condition objects'
});
}
break;
case 'resourceLocator':
// Validate resourceLocator structure: must have mode and value
if (!value.mode) {
result.errors.push({
type: 'invalid_configuration',
property: `${propertyName}.mode`,
message: 'ResourceLocator must have a mode field',
fix: 'Add mode: "id", mode: "url", or mode: "list" to the resourceLocator configuration'
});
} else if (!['id', 'url', 'list', 'name'].includes(value.mode)) {
result.errors.push({
type: 'invalid_configuration',
property: `${propertyName}.mode`,
message: `Invalid mode value: ${value.mode}. Must be "id", "url", "list", or "name"`,
fix: 'Set mode to one of: "id", "url", "list", "name"'
});
}
if (!value.hasOwnProperty('value')) {
result.errors.push({
type: 'invalid_configuration',
property: `${propertyName}.value`,
message: 'ResourceLocator must have a value field',
fix: 'Add value field to the resourceLocator configuration'
});
}
break;
case 'assignmentCollection':
// Validate assignmentCollection structure: must have assignments array
if (!value.assignments) {
result.errors.push({
type: 'invalid_configuration',
property: `${propertyName}.assignments`,
message: 'AssignmentCollection must have an assignments field',
fix: 'Add assignments array to the assignmentCollection configuration'
});
} else if (!Array.isArray(value.assignments)) {
result.errors.push({
type: 'invalid_configuration',
property: `${propertyName}.assignments`,
message: 'AssignmentCollection assignments must be an array',
fix: 'Ensure assignments is an array of assignment objects'
});
}
break;
case 'resourceMapper':
// Validate resourceMapper structure: must have mappingMode
if (!value.mappingMode) {
result.errors.push({
type: 'invalid_configuration',
property: `${propertyName}.mappingMode`,
message: 'ResourceMapper must have a mappingMode field',
fix: 'Add mappingMode: "defineBelow" or mappingMode: "autoMapInputData"'
});
} else if (!['defineBelow', 'autoMapInputData'].includes(value.mappingMode)) {
result.errors.push({
type: 'invalid_configuration',
property: `${propertyName}.mappingMode`,
message: `Invalid mappingMode: ${value.mappingMode}. Must be "defineBelow" or "autoMapInputData"`,
fix: 'Set mappingMode to either "defineBelow" or "autoMapInputData"'
});
}
break;
}
}
/**
* Validate filter operations match operator types
*
* Ensures that filter operations are compatible with their operator types.
* For example, 'gt' (greater than) is only valid for numbers, not strings.
*
* @param conditions - Array of filter conditions to validate
* @param propertyName - Name of the filter property (for error reporting)
* @param result - Validation result to populate with errors
*/
private static validateFilterOperations(
conditions: any,
propertyName: string,
result: EnhancedValidationResult
): void {
if (!Array.isArray(conditions)) return;
// Operation validation rules based on n8n filter type definitions
const VALID_OPERATIONS_BY_TYPE: Record<string, string[]> = {
string: [
'empty', 'notEmpty', 'equals', 'notEquals',
'contains', 'notContains', 'startsWith', 'notStartsWith',
'endsWith', 'notEndsWith', 'regex', 'notRegex',
'exists', 'notExists', 'isNotEmpty' // exists checks field presence, isNotEmpty alias for notEmpty
],
number: [
'empty', 'notEmpty', 'equals', 'notEquals', 'gt', 'lt', 'gte', 'lte',
'exists', 'notExists', 'isNotEmpty'
],
dateTime: [
'empty', 'notEmpty', 'equals', 'notEquals', 'after', 'before', 'afterOrEquals', 'beforeOrEquals',
'exists', 'notExists', 'isNotEmpty'
],
boolean: [
'empty', 'notEmpty', 'true', 'false', 'equals', 'notEquals',
'exists', 'notExists', 'isNotEmpty'
],
array: [
'contains', 'notContains', 'lengthEquals', 'lengthNotEquals',
'lengthGt', 'lengthLt', 'lengthGte', 'lengthLte', 'empty', 'notEmpty',
'exists', 'notExists', 'isNotEmpty'
],
object: [
'empty', 'notEmpty',
'exists', 'notExists', 'isNotEmpty'
],
any: ['exists', 'notExists', 'isNotEmpty']
};
for (let i = 0; i < conditions.length; i++) {
const condition = conditions[i];
if (!condition.operator || typeof condition.operator !== 'object') continue;
const { type, operation } = condition.operator;
if (!type || !operation) continue;
// Get valid operations for this type
const validOperations = VALID_OPERATIONS_BY_TYPE[type];
if (!validOperations) {
result.warnings.push({
type: 'best_practice',
property: `${propertyName}.conditions[${i}].operator.type`,
message: `Unknown operator type: ${type}`
});
continue;
}
// Check if operation is valid for this type
if (!validOperations.includes(operation)) {
result.errors.push({
type: 'invalid_value',
property: `${propertyName}.conditions[${i}].operator.operation`,
message: `Operation '${operation}' is not valid for type '${type}'`,
fix: `Use one of the valid operations for ${type}: ${validOperations.join(', ')}`
});
}
}
}
}

View File

@@ -170,24 +170,6 @@ export class N8nApiClient {
}
}
async activateWorkflow(id: string): Promise<Workflow> {
try {
const response = await this.client.post(`/workflows/${id}/activate`);
return response.data;
} catch (error) {
throw handleN8nApiError(error);
}
}
async deactivateWorkflow(id: string): Promise<Workflow> {
try {
const response = await this.client.post(`/workflows/${id}/deactivate`);
return response.data;
} catch (error) {
throw handleN8nApiError(error);
}
}
/**
* Lists workflows from n8n instance.
*

View File

@@ -103,8 +103,7 @@ export function cleanWorkflowForCreate(workflow: Partial<Workflow>): Partial<Wor
} = workflow;
// Ensure settings are present with defaults
// Treat empty settings object {} the same as missing settings
if (!cleanedWorkflow.settings || Object.keys(cleanedWorkflow.settings).length === 0) {
if (!cleanedWorkflow.settings) {
cleanedWorkflow.settings = defaultWorkflowSettings;
}
@@ -140,7 +139,6 @@ export function cleanWorkflowForUpdate(workflow: Workflow): Partial<Workflow> {
// Remove fields that cause API errors
pinData,
tags,
description, // Issue #431: n8n returns this field but rejects it in updates
// Remove additional fields that n8n API doesn't accept
isArchived,
usedCredentials,
@@ -157,17 +155,16 @@ export function cleanWorkflowForUpdate(workflow: Workflow): Partial<Workflow> {
//
// PROBLEM:
// - Some versions reject updates with settings properties (community forum reports)
// - Cloud versions REQUIRE settings property to be present (n8n.estyl.team)
// - Properties like callerPolicy cause "additional properties" errors
// - Empty settings objects {} cause "additional properties" validation errors (Issue #431)
//
// SOLUTION:
// - Filter settings to only include whitelisted properties (OpenAPI spec)
// - If no settings after filtering, omit the property entirely (n8n API rejects empty objects)
// - Omitting the property prevents "additional properties" validation errors
// - If no settings provided, use empty object {} for safety
// - Empty object satisfies "required property" validation (cloud API)
// - Whitelisted properties prevent "additional properties" errors
//
// References:
// - Issue #431: Empty settings validation error
// - https://community.n8n.io/t/api-workflow-update-endpoint-doesnt-support-setting-callerpolicy/161916
// - OpenAPI spec: workflowSettings schema
// - Tested on n8n.estyl.team (cloud) and localhost (self-hosted)
@@ -192,19 +189,10 @@ export function cleanWorkflowForUpdate(workflow: Workflow): Partial<Workflow> {
filteredSettings[key] = (cleanedWorkflow.settings as any)[key];
}
}
// n8n API requires settings to be present but rejects empty settings objects.
// If no valid properties remain after filtering, include minimal default settings.
if (Object.keys(filteredSettings).length > 0) {
cleanedWorkflow.settings = filteredSettings;
} else {
// Provide minimal valid settings (executionOrder v1 is the modern default)
cleanedWorkflow.settings = { executionOrder: 'v1' as const };
}
cleanedWorkflow.settings = filteredSettings;
} else {
// No settings provided - include minimal default settings
// n8n API requires settings in workflow updates (v1 is the modern default)
cleanedWorkflow.settings = { executionOrder: 'v1' as const };
// No settings provided - use empty object for safety
cleanedWorkflow.settings = {};
}
return cleanedWorkflow;

View File

@@ -234,11 +234,17 @@ export class NodeSpecificValidators {
static validateGoogleSheets(context: NodeValidationContext): void {
const { config, errors, warnings, suggestions } = context;
const { operation } = config;
// NOTE: Skip sheetId validation - it comes from credentials, not configuration
// In real workflows, sheetId is provided by Google Sheets credentials
// See Phase 3 validation results: 113/124 failures were false positives for this
// Common validations
if (!config.sheetId && !config.documentId) {
errors.push({
type: 'missing_required',
property: 'sheetId',
message: 'Spreadsheet ID is required',
fix: 'Provide the Google Sheets document ID from the URL'
});
}
// Operation-specific validations
switch (operation) {
case 'append':
@@ -254,30 +260,11 @@ export class NodeSpecificValidators {
this.validateGoogleSheetsDelete(context);
break;
}
// Range format validation
if (config.range) {
this.validateGoogleSheetsRange(config.range, errors, warnings);
}
// FINAL STEP: Filter out sheetId errors (credential-provided field)
// Remove any sheetId validation errors that might have been added by nested validators
const filteredErrors: ValidationError[] = [];
for (const error of errors) {
// Skip sheetId errors - this field is provided by credentials
if (error.property === 'sheetId' && error.type === 'missing_required') {
continue;
}
// Skip errors about sheetId in nested paths (e.g., from resourceMapper validation)
if (error.property && error.property.includes('sheetId') && error.type === 'missing_required') {
continue;
}
filteredErrors.push(error);
}
// Replace errors array with filtered version
errors.length = 0;
errors.push(...filteredErrors);
}
private static validateGoogleSheetsAppend(context: NodeValidationContext): void {
@@ -731,110 +718,9 @@ export class NodeSpecificValidators {
});
}
}
/**
* Validate AI Agent node configuration
* Note: This provides basic model connection validation at the node level.
* Full AI workflow validation (tools, memory, etc.) is handled by workflow-validator.
*/
static validateAIAgent(context: NodeValidationContext): void {
const { config, errors, warnings, suggestions, autofix } = context;
// Check for language model configuration
// AI Agent nodes receive model connections via ai_languageModel connection type
// We validate this during workflow validation, but provide hints here for common issues
// Check prompt type configuration
if (config.promptType === 'define') {
if (!config.text || (typeof config.text === 'string' && config.text.trim() === '')) {
errors.push({
type: 'missing_required',
property: 'text',
message: 'Custom prompt text is required when promptType is "define"',
fix: 'Provide a custom prompt in the text field, or change promptType to "auto"'
});
}
}
// Check system message (RECOMMENDED)
if (!config.systemMessage || (typeof config.systemMessage === 'string' && config.systemMessage.trim() === '')) {
suggestions.push('AI Agent works best with a system message that defines the agent\'s role, capabilities, and constraints. Set systemMessage to provide context.');
} else if (typeof config.systemMessage === 'string' && config.systemMessage.trim().length < 20) {
warnings.push({
type: 'inefficient',
property: 'systemMessage',
message: 'System message is very short (< 20 characters)',
suggestion: 'Consider a more detailed system message to guide the agent\'s behavior'
});
}
// Check output parser configuration
if (config.hasOutputParser === true) {
warnings.push({
type: 'best_practice',
property: 'hasOutputParser',
message: 'Output parser is enabled. Ensure an ai_outputParser connection is configured in the workflow.',
suggestion: 'Connect an output parser node (e.g., Structured Output Parser) via ai_outputParser connection type'
});
}
// Check fallback model configuration
if (config.needsFallback === true) {
warnings.push({
type: 'best_practice',
property: 'needsFallback',
message: 'Fallback model is enabled. Ensure 2 language models are connected via ai_languageModel connections.',
suggestion: 'Connect a primary model and a fallback model to handle failures gracefully'
});
}
// Check maxIterations
if (config.maxIterations !== undefined) {
const maxIter = Number(config.maxIterations);
if (isNaN(maxIter) || maxIter < 1) {
errors.push({
type: 'invalid_value',
property: 'maxIterations',
message: 'maxIterations must be a positive number',
fix: 'Set maxIterations to a value >= 1 (e.g., 10)'
});
} else if (maxIter > 50) {
warnings.push({
type: 'inefficient',
property: 'maxIterations',
message: `maxIterations is set to ${maxIter}. High values can lead to long execution times and high costs.`,
suggestion: 'Consider reducing maxIterations to 10-20 for most use cases'
});
}
}
// Error handling for AI operations
if (!config.onError && !config.retryOnFail && !config.continueOnFail) {
warnings.push({
type: 'best_practice',
property: 'errorHandling',
message: 'AI models can fail due to API limits, rate limits, or invalid responses',
suggestion: 'Add onError: "continueRegularOutput" with retryOnFail for resilience'
});
autofix.onError = 'continueRegularOutput';
autofix.retryOnFail = true;
autofix.maxTries = 2;
autofix.waitBetweenTries = 5000; // AI models may have rate limits
}
// Check for deprecated continueOnFail
if (config.continueOnFail !== undefined) {
warnings.push({
type: 'deprecated',
property: 'continueOnFail',
message: 'continueOnFail is deprecated. Use onError instead',
suggestion: 'Replace with onError: "continueRegularOutput" or "stopWorkflow"'
});
}
}
/**
* Validate MySQL node configuration
* Validate MySQL node configuration
*/
static validateMySQL(context: NodeValidationContext): void {
const { config, errors, warnings, suggestions } = context;
@@ -1720,5 +1606,4 @@ export class NodeSpecificValidators {
}
}
}
}

View File

@@ -1,427 +0,0 @@
/**
* Type Structure Service
*
* Provides methods to query and work with n8n property type structures.
* This service is stateless and uses static methods following the project's
* PropertyFilter and ConfigValidator patterns.
*
* @module services/type-structure-service
* @since 2.23.0
*/
import type { NodePropertyTypes } from 'n8n-workflow';
import type { TypeStructure } from '../types/type-structures';
import {
isComplexType as isComplexTypeGuard,
isPrimitiveType as isPrimitiveTypeGuard,
} from '../types/type-structures';
import { TYPE_STRUCTURES, COMPLEX_TYPE_EXAMPLES } from '../constants/type-structures';
/**
* Result of type validation
*/
export interface TypeValidationResult {
/**
* Whether the value is valid for the type
*/
valid: boolean;
/**
* Validation errors if invalid
*/
errors: string[];
/**
* Warnings that don't prevent validity
*/
warnings: string[];
}
/**
* Service for querying and working with node property type structures
*
* Provides static methods to:
* - Get type structure definitions
* - Get example values
* - Validate type compatibility
* - Query type categories
*
* @example
* ```typescript
* // Get structure for a type
* const structure = TypeStructureService.getStructure('collection');
* console.log(structure.description); // "A group of related properties..."
*
* // Get example value
* const example = TypeStructureService.getExample('filter');
* console.log(example.combinator); // "and"
*
* // Check if type is complex
* if (TypeStructureService.isComplexType('resourceMapper')) {
* console.log('This type needs special handling');
* }
* ```
*/
export class TypeStructureService {
/**
* Get the structure definition for a property type
*
* Returns the complete structure definition including:
* - Type category (primitive/object/collection/special)
* - JavaScript type
* - Expected structure for complex types
* - Example values
* - Validation rules
*
* @param type - The NodePropertyType to query
* @returns Type structure definition, or null if type is unknown
*
* @example
* ```typescript
* const structure = TypeStructureService.getStructure('string');
* console.log(structure.jsType); // "string"
* console.log(structure.example); // "Hello World"
* ```
*/
static getStructure(type: NodePropertyTypes): TypeStructure | null {
return TYPE_STRUCTURES[type] || null;
}
/**
* Get all type structure definitions
*
* Returns a record of all 22 NodePropertyTypes with their structures.
* Useful for documentation, validation setup, or UI generation.
*
* @returns Record mapping all types to their structures
*
* @example
* ```typescript
* const allStructures = TypeStructureService.getAllStructures();
* console.log(Object.keys(allStructures).length); // 22
* ```
*/
static getAllStructures(): Record<NodePropertyTypes, TypeStructure> {
return { ...TYPE_STRUCTURES };
}
/**
* Get example value for a property type
*
* Returns a working example value that conforms to the type's
* expected structure. Useful for testing, documentation, or
* generating default values.
*
* @param type - The NodePropertyType to get an example for
* @returns Example value, or null if type is unknown
*
* @example
* ```typescript
* const example = TypeStructureService.getExample('number');
* console.log(example); // 42
*
* const filterExample = TypeStructureService.getExample('filter');
* console.log(filterExample.combinator); // "and"
* ```
*/
static getExample(type: NodePropertyTypes): any {
const structure = this.getStructure(type);
return structure ? structure.example : null;
}
/**
* Get all example values for a property type
*
* Some types have multiple examples to show different use cases.
* This returns all available examples, or falls back to the
* primary example if only one exists.
*
* @param type - The NodePropertyType to get examples for
* @returns Array of example values
*
* @example
* ```typescript
* const examples = TypeStructureService.getExamples('string');
* console.log(examples.length); // 4
* console.log(examples[0]); // ""
* console.log(examples[1]); // "A simple text"
* ```
*/
static getExamples(type: NodePropertyTypes): any[] {
const structure = this.getStructure(type);
if (!structure) return [];
return structure.examples || [structure.example];
}
/**
* Check if a property type is complex
*
* Complex types have nested structures and require special
* validation logic beyond simple type checking.
*
* Complex types: collection, fixedCollection, resourceLocator,
* resourceMapper, filter, assignmentCollection
*
* @param type - The property type to check
* @returns True if the type is complex
*
* @example
* ```typescript
* TypeStructureService.isComplexType('collection'); // true
* TypeStructureService.isComplexType('string'); // false
* ```
*/
static isComplexType(type: NodePropertyTypes): boolean {
return isComplexTypeGuard(type);
}
/**
* Check if a property type is primitive
*
* Primitive types map to simple JavaScript values and only
* need basic type validation.
*
* Primitive types: string, number, boolean, dateTime, color, json
*
* @param type - The property type to check
* @returns True if the type is primitive
*
* @example
* ```typescript
* TypeStructureService.isPrimitiveType('string'); // true
* TypeStructureService.isPrimitiveType('collection'); // false
* ```
*/
static isPrimitiveType(type: NodePropertyTypes): boolean {
return isPrimitiveTypeGuard(type);
}
/**
* Get all complex property types
*
* Returns an array of all property types that are classified
* as complex (having nested structures).
*
* @returns Array of complex type names
*
* @example
* ```typescript
* const complexTypes = TypeStructureService.getComplexTypes();
* console.log(complexTypes);
* // ['collection', 'fixedCollection', 'resourceLocator', ...]
* ```
*/
static getComplexTypes(): NodePropertyTypes[] {
return Object.entries(TYPE_STRUCTURES)
.filter(([, structure]) => structure.type === 'collection' || structure.type === 'special')
.filter(([type]) => this.isComplexType(type as NodePropertyTypes))
.map(([type]) => type as NodePropertyTypes);
}
/**
* Get all primitive property types
*
* Returns an array of all property types that are classified
* as primitive (simple JavaScript values).
*
* @returns Array of primitive type names
*
* @example
* ```typescript
* const primitiveTypes = TypeStructureService.getPrimitiveTypes();
* console.log(primitiveTypes);
* // ['string', 'number', 'boolean', 'dateTime', 'color', 'json']
* ```
*/
static getPrimitiveTypes(): NodePropertyTypes[] {
return Object.keys(TYPE_STRUCTURES).filter((type) =>
this.isPrimitiveType(type as NodePropertyTypes)
) as NodePropertyTypes[];
}
/**
* Get real-world examples for complex types
*
* Returns curated examples from actual n8n workflows showing
* different usage patterns for complex types.
*
* @param type - The complex type to get examples for
* @returns Object with named example scenarios, or null
*
* @example
* ```typescript
* const examples = TypeStructureService.getComplexExamples('fixedCollection');
* console.log(examples.httpHeaders);
* // { headers: [{ name: 'Content-Type', value: 'application/json' }] }
* ```
*/
static getComplexExamples(
type: 'collection' | 'fixedCollection' | 'filter' | 'resourceMapper' | 'assignmentCollection'
): Record<string, any> | null {
return COMPLEX_TYPE_EXAMPLES[type] || null;
}
/**
* Validate basic type compatibility of a value
*
* Performs simple type checking to verify a value matches the
* expected JavaScript type for a property type. Does not perform
* deep structure validation for complex types.
*
* @param value - The value to validate
* @param type - The expected property type
* @returns Validation result with errors if invalid
*
* @example
* ```typescript
* const result = TypeStructureService.validateTypeCompatibility(
* 'Hello',
* 'string'
* );
* console.log(result.valid); // true
*
* const result2 = TypeStructureService.validateTypeCompatibility(
* 123,
* 'string'
* );
* console.log(result2.valid); // false
* console.log(result2.errors[0]); // "Expected string but got number"
* ```
*/
static validateTypeCompatibility(
value: any,
type: NodePropertyTypes
): TypeValidationResult {
const structure = this.getStructure(type);
if (!structure) {
return {
valid: false,
errors: [`Unknown property type: ${type}`],
warnings: [],
};
}
const errors: string[] = [];
const warnings: string[] = [];
// Handle null/undefined
if (value === null || value === undefined) {
if (!structure.validation?.allowEmpty) {
errors.push(`Value is required for type ${type}`);
}
return { valid: errors.length === 0, errors, warnings };
}
// Check JavaScript type compatibility
const actualType = Array.isArray(value) ? 'array' : typeof value;
const expectedType = structure.jsType;
if (expectedType !== 'any' && actualType !== expectedType) {
// Special case: expressions are strings but might be allowed
const isExpression = typeof value === 'string' && value.includes('{{');
if (isExpression && structure.validation?.allowExpressions) {
warnings.push(
`Value contains n8n expression - cannot validate type until runtime`
);
} else {
errors.push(`Expected ${expectedType} but got ${actualType}`);
}
}
// Additional validation for specific types
if (type === 'dateTime' && typeof value === 'string') {
const pattern = structure.validation?.pattern;
if (pattern && !new RegExp(pattern).test(value)) {
errors.push(`Invalid dateTime format. Expected ISO 8601 format.`);
}
}
if (type === 'color' && typeof value === 'string') {
const pattern = structure.validation?.pattern;
if (pattern && !new RegExp(pattern).test(value)) {
errors.push(`Invalid color format. Expected 6-digit hex color (e.g., #FF5733).`);
}
}
if (type === 'json' && typeof value === 'string') {
try {
JSON.parse(value);
} catch {
errors.push(`Invalid JSON string. Must be valid JSON when parsed.`);
}
}
return {
valid: errors.length === 0,
errors,
warnings,
};
}
/**
* Get type description
*
* Returns the human-readable description of what a property type
* represents and how it should be used.
*
* @param type - The property type
* @returns Description string, or null if type unknown
*
* @example
* ```typescript
* const description = TypeStructureService.getDescription('filter');
* console.log(description);
* // "Defines conditions for filtering data with boolean logic"
* ```
*/
static getDescription(type: NodePropertyTypes): string | null {
const structure = this.getStructure(type);
return structure ? structure.description : null;
}
/**
* Get type notes
*
* Returns additional notes, warnings, or usage tips for a type.
* Not all types have notes.
*
* @param type - The property type
* @returns Array of note strings, or empty array
*
* @example
* ```typescript
* const notes = TypeStructureService.getNotes('filter');
* console.log(notes[0]);
* // "Advanced filtering UI in n8n"
* ```
*/
static getNotes(type: NodePropertyTypes): string[] {
const structure = this.getStructure(type);
return structure?.notes || [];
}
/**
* Get JavaScript type for a property type
*
* Returns the underlying JavaScript type that the property
* type maps to (string, number, boolean, object, array, any).
*
* @param type - The property type
* @returns JavaScript type name, or null if unknown
*
* @example
* ```typescript
* TypeStructureService.getJavaScriptType('string'); // "string"
* TypeStructureService.getJavaScriptType('collection'); // "object"
* TypeStructureService.getJavaScriptType('multiOptions'); // "array"
* ```
*/
static getJavaScriptType(
type: NodePropertyTypes
): 'string' | 'number' | 'boolean' | 'object' | 'array' | 'any' | null {
const structure = this.getStructure(type);
return structure ? structure.jsType : null;
}
}

View File

@@ -25,8 +25,6 @@ import {
UpdateNameOperation,
AddTagOperation,
RemoveTagOperation,
ActivateWorkflowOperation,
DeactivateWorkflowOperation,
CleanStaleConnectionsOperation,
ReplaceConnectionsOperation
} from '../types/workflow-diff';
@@ -34,7 +32,6 @@ import { Workflow, WorkflowNode, WorkflowConnection } from '../types/n8n-api';
import { Logger } from '../utils/logger';
import { validateWorkflowNode, validateWorkflowConnections } from './n8n-validation';
import { sanitizeNode, sanitizeWorkflowNodes } from './node-sanitizer';
import { isActivatableTrigger } from '../utils/node-type-utils';
const logger = new Logger({ prefix: '[WorkflowDiffEngine]' });
@@ -217,23 +214,12 @@ export class WorkflowDiffEngine {
}
const operationsApplied = request.operations.length;
// Extract activation flags from workflow object
const shouldActivate = (workflowCopy as any)._shouldActivate === true;
const shouldDeactivate = (workflowCopy as any)._shouldDeactivate === true;
// Clean up temporary flags
delete (workflowCopy as any)._shouldActivate;
delete (workflowCopy as any)._shouldDeactivate;
return {
success: true,
workflow: workflowCopy,
operationsApplied,
message: `Successfully applied ${operationsApplied} operations (${nodeOperations.length} node ops, ${otherOperations.length} other ops)`,
warnings: this.warnings.length > 0 ? this.warnings : undefined,
shouldActivate: shouldActivate || undefined,
shouldDeactivate: shouldDeactivate || undefined
warnings: this.warnings.length > 0 ? this.warnings : undefined
};
}
} catch (error) {
@@ -276,10 +262,6 @@ export class WorkflowDiffEngine {
case 'addTag':
case 'removeTag':
return null; // These are always valid
case 'activateWorkflow':
return this.validateActivateWorkflow(workflow, operation);
case 'deactivateWorkflow':
return this.validateDeactivateWorkflow(workflow, operation);
case 'cleanStaleConnections':
return this.validateCleanStaleConnections(workflow, operation);
case 'replaceConnections':
@@ -333,12 +315,6 @@ export class WorkflowDiffEngine {
case 'removeTag':
this.applyRemoveTag(workflow, operation);
break;
case 'activateWorkflow':
this.applyActivateWorkflow(workflow, operation);
break;
case 'deactivateWorkflow':
this.applyDeactivateWorkflow(workflow, operation);
break;
case 'cleanStaleConnections':
this.applyCleanStaleConnections(workflow, operation);
break;
@@ -397,17 +373,6 @@ export class WorkflowDiffEngine {
}
private validateUpdateNode(workflow: Workflow, operation: UpdateNodeOperation): string | null {
// Check for common parameter mistake: "changes" instead of "updates" (Issue #392)
const operationAny = operation as any;
if (operationAny.changes && !operation.updates) {
return `Invalid parameter 'changes'. The updateNode operation requires 'updates' (not 'changes'). Example: {type: "updateNode", nodeId: "abc", updates: {name: "New Name", "parameters.url": "https://example.com"}}`;
}
// Check for missing required parameter
if (!operation.updates) {
return `Missing required parameter 'updates'. The updateNode operation requires an 'updates' object containing properties to modify. Example: {type: "updateNode", nodeId: "abc", updates: {name: "New Name"}}`;
}
const node = this.findNode(workflow, operation.nodeId, operation.nodeName);
if (!node) {
return this.formatNodeNotFoundError(workflow, operation.nodeId || operation.nodeName || '', 'updateNode');
@@ -861,14 +826,10 @@ export class WorkflowDiffEngine {
// Metadata operation appliers
private applyUpdateSettings(workflow: Workflow, operation: UpdateSettingsOperation): void {
// Only create/update settings if operation provides actual properties
// This prevents creating empty settings objects that would be rejected by n8n API
if (operation.settings && Object.keys(operation.settings).length > 0) {
if (!workflow.settings) {
workflow.settings = {};
}
Object.assign(workflow.settings, operation.settings);
if (!workflow.settings) {
workflow.settings = {};
}
Object.assign(workflow.settings, operation.settings);
}
private applyUpdateName(workflow: Workflow, operation: UpdateNameOperation): void {
@@ -886,46 +847,13 @@ export class WorkflowDiffEngine {
private applyRemoveTag(workflow: Workflow, operation: RemoveTagOperation): void {
if (!workflow.tags) return;
const index = workflow.tags.indexOf(operation.tag);
if (index !== -1) {
workflow.tags.splice(index, 1);
}
}
// Workflow activation operation validators
private validateActivateWorkflow(workflow: Workflow, operation: ActivateWorkflowOperation): string | null {
// Check if workflow has at least one activatable trigger
// Issue #351: executeWorkflowTrigger cannot activate workflows
const activatableTriggers = workflow.nodes.filter(
node => !node.disabled && isActivatableTrigger(node.type)
);
if (activatableTriggers.length === 0) {
return 'Cannot activate workflow: No activatable trigger nodes found. Workflows must have at least one enabled trigger node (webhook, schedule, email, etc.). Note: executeWorkflowTrigger cannot activate workflows as they can only be invoked by other workflows.';
}
return null;
}
private validateDeactivateWorkflow(workflow: Workflow, operation: DeactivateWorkflowOperation): string | null {
// Deactivation is always valid - any workflow can be deactivated
return null;
}
// Workflow activation operation appliers
private applyActivateWorkflow(workflow: Workflow, operation: ActivateWorkflowOperation): void {
// Set flag in workflow object to indicate activation intent
// The handler will call the API method after workflow update
(workflow as any)._shouldActivate = true;
}
private applyDeactivateWorkflow(workflow: Workflow, operation: DeactivateWorkflowOperation): void {
// Set flag in workflow object to indicate deactivation intent
// The handler will call the API method after workflow update
(workflow as any)._shouldDeactivate = true;
}
// Connection cleanup operation validators
private validateCleanStaleConnections(workflow: Workflow, operation: CleanStaleConnectionsOperation): string | null {
// This operation is always valid - it just cleans up what it finds

View File

@@ -3,7 +3,6 @@
* Validates complete workflow structure, connections, and node configurations
*/
import crypto from 'crypto';
import { NodeRepository } from '../database/node-repository';
import { EnhancedConfigValidator } from './enhanced-config-validator';
import { ExpressionValidator } from './expression-validator';
@@ -298,11 +297,8 @@ export class WorkflowValidator {
// Check for duplicate node names
const nodeNames = new Set<string>();
const nodeIds = new Set<string>();
const nodeIdToIndex = new Map<string, number>(); // Track which node index has which ID
for (let i = 0; i < workflow.nodes.length; i++) {
const node = workflow.nodes[i];
for (const node of workflow.nodes) {
if (nodeNames.has(node.name)) {
result.errors.push({
type: 'error',
@@ -314,18 +310,13 @@ export class WorkflowValidator {
nodeNames.add(node.name);
if (nodeIds.has(node.id)) {
const firstNodeIndex = nodeIdToIndex.get(node.id);
const firstNode = firstNodeIndex !== undefined ? workflow.nodes[firstNodeIndex] : undefined;
result.errors.push({
type: 'error',
nodeId: node.id,
message: `Duplicate node ID: "${node.id}". Node at index ${i} (name: "${node.name}", type: "${node.type}") conflicts with node at index ${firstNodeIndex} (name: "${firstNode?.name || 'unknown'}", type: "${firstNode?.type || 'unknown'}"). Each node must have a unique ID. Generate a new UUID using crypto.randomUUID() - Example: {id: "${crypto.randomUUID()}", name: "${node.name}", type: "${node.type}", ...}`
message: `Duplicate node ID: "${node.id}"`
});
} else {
nodeIds.add(node.id);
nodeIdToIndex.set(node.id, i);
}
nodeIds.add(node.id);
}
// Count trigger nodes using shared trigger detection

View File

@@ -4,36 +4,14 @@
*/
import { SupabaseClient } from '@supabase/supabase-js';
import { TelemetryEvent, WorkflowTelemetry, WorkflowMutationRecord, TELEMETRY_CONFIG, TelemetryMetrics } from './telemetry-types';
import { TelemetryEvent, WorkflowTelemetry, TELEMETRY_CONFIG, TelemetryMetrics } from './telemetry-types';
import { TelemetryError, TelemetryErrorType, TelemetryCircuitBreaker } from './telemetry-error';
import { logger } from '../utils/logger';
/**
* Convert camelCase object keys to snake_case
* Needed because Supabase PostgREST doesn't auto-convert
*/
function toSnakeCase(obj: any): any {
if (obj === null || obj === undefined) return obj;
if (Array.isArray(obj)) return obj.map(toSnakeCase);
if (typeof obj !== 'object') return obj;
const result: any = {};
for (const key in obj) {
if (obj.hasOwnProperty(key)) {
// Convert camelCase to snake_case
const snakeKey = key.replace(/[A-Z]/g, letter => `_${letter.toLowerCase()}`);
// Recursively convert nested objects
result[snakeKey] = toSnakeCase(obj[key]);
}
}
return result;
}
export class TelemetryBatchProcessor {
private flushTimer?: NodeJS.Timeout;
private isFlushingEvents: boolean = false;
private isFlushingWorkflows: boolean = false;
private isFlushingMutations: boolean = false;
private circuitBreaker: TelemetryCircuitBreaker;
private metrics: TelemetryMetrics = {
eventsTracked: 0,
@@ -45,7 +23,7 @@ export class TelemetryBatchProcessor {
rateLimitHits: 0
};
private flushTimes: number[] = [];
private deadLetterQueue: (TelemetryEvent | WorkflowTelemetry | WorkflowMutationRecord)[] = [];
private deadLetterQueue: (TelemetryEvent | WorkflowTelemetry)[] = [];
private readonly maxDeadLetterSize = 100;
constructor(
@@ -98,15 +76,15 @@ export class TelemetryBatchProcessor {
}
/**
* Flush events, workflows, and mutations to Supabase
* Flush events and workflows to Supabase
*/
async flush(events?: TelemetryEvent[], workflows?: WorkflowTelemetry[], mutations?: WorkflowMutationRecord[]): Promise<void> {
async flush(events?: TelemetryEvent[], workflows?: WorkflowTelemetry[]): Promise<void> {
if (!this.isEnabled() || !this.supabase) return;
// Check circuit breaker
if (!this.circuitBreaker.shouldAllow()) {
logger.debug('Circuit breaker open - skipping flush');
this.metrics.eventsDropped += (events?.length || 0) + (workflows?.length || 0) + (mutations?.length || 0);
this.metrics.eventsDropped += (events?.length || 0) + (workflows?.length || 0);
return;
}
@@ -123,11 +101,6 @@ export class TelemetryBatchProcessor {
hasErrors = !(await this.flushWorkflows(workflows)) || hasErrors;
}
// Flush mutations if provided
if (mutations && mutations.length > 0) {
hasErrors = !(await this.flushMutations(mutations)) || hasErrors;
}
// Record flush time
const flushTime = Date.now() - startTime;
this.recordFlushTime(flushTime);
@@ -251,71 +224,6 @@ export class TelemetryBatchProcessor {
}
}
/**
* Flush workflow mutations with batching
*/
private async flushMutations(mutations: WorkflowMutationRecord[]): Promise<boolean> {
if (this.isFlushingMutations || mutations.length === 0) return true;
this.isFlushingMutations = true;
try {
// Batch mutations
const batches = this.createBatches(mutations, TELEMETRY_CONFIG.MAX_BATCH_SIZE);
for (const batch of batches) {
const result = await this.executeWithRetry(async () => {
// Convert camelCase to snake_case for Supabase
const snakeCaseBatch = batch.map(mutation => toSnakeCase(mutation));
const { error } = await this.supabase!
.from('workflow_mutations')
.insert(snakeCaseBatch);
if (error) {
// Enhanced error logging for mutation flushes
logger.error('Mutation insert error details:', {
code: (error as any).code,
message: (error as any).message,
details: (error as any).details,
hint: (error as any).hint,
fullError: String(error)
});
throw error;
}
logger.debug(`Flushed batch of ${batch.length} workflow mutations`);
return true;
}, 'Flush workflow mutations');
if (result) {
this.metrics.eventsTracked += batch.length;
this.metrics.batchesSent++;
} else {
this.metrics.eventsFailed += batch.length;
this.metrics.batchesFailed++;
this.addToDeadLetterQueue(batch);
return false;
}
}
return true;
} catch (error) {
logger.error('Failed to flush mutations with details:', {
errorMsg: error instanceof Error ? error.message : String(error),
errorType: error instanceof Error ? error.constructor.name : typeof error
});
throw new TelemetryError(
TelemetryErrorType.NETWORK_ERROR,
'Failed to flush workflow mutations',
{ error: error instanceof Error ? error.message : String(error) },
true
);
} finally {
this.isFlushingMutations = false;
}
}
/**
* Execute operation with exponential backoff retry
*/
@@ -397,7 +305,7 @@ export class TelemetryBatchProcessor {
/**
* Add failed items to dead letter queue
*/
private addToDeadLetterQueue(items: (TelemetryEvent | WorkflowTelemetry | WorkflowMutationRecord)[]): void {
private addToDeadLetterQueue(items: (TelemetryEvent | WorkflowTelemetry)[]): void {
for (const item of items) {
this.deadLetterQueue.push(item);

View File

@@ -4,7 +4,7 @@
* Now uses shared sanitization utilities to avoid code duplication
*/
import { TelemetryEvent, WorkflowTelemetry, WorkflowMutationRecord } from './telemetry-types';
import { TelemetryEvent, WorkflowTelemetry } from './telemetry-types';
import { WorkflowSanitizer } from './workflow-sanitizer';
import { TelemetryRateLimiter } from './rate-limiter';
import { TelemetryEventValidator } from './event-validator';
@@ -19,7 +19,6 @@ export class TelemetryEventTracker {
private validator: TelemetryEventValidator;
private eventQueue: TelemetryEvent[] = [];
private workflowQueue: WorkflowTelemetry[] = [];
private mutationQueue: WorkflowMutationRecord[] = [];
private previousTool?: string;
private previousToolTimestamp: number = 0;
private performanceMetrics: Map<string, number[]> = new Map();
@@ -326,13 +325,6 @@ export class TelemetryEventTracker {
return [...this.workflowQueue];
}
/**
* Get queued mutations
*/
getMutationQueue(): WorkflowMutationRecord[] {
return [...this.mutationQueue];
}
/**
* Clear event queue
*/
@@ -347,28 +339,6 @@ export class TelemetryEventTracker {
this.workflowQueue = [];
}
/**
* Clear mutation queue
*/
clearMutationQueue(): void {
this.mutationQueue = [];
}
/**
* Enqueue mutation for batch processing
*/
enqueueMutation(mutation: WorkflowMutationRecord): void {
if (!this.isEnabled()) return;
this.mutationQueue.push(mutation);
}
/**
* Get mutation queue size
*/
getMutationQueueSize(): number {
return this.mutationQueue.length;
}
/**
* Get tracking statistics
*/
@@ -378,7 +348,6 @@ export class TelemetryEventTracker {
validator: this.validator.getStats(),
eventQueueSize: this.eventQueue.length,
workflowQueueSize: this.workflowQueue.length,
mutationQueueSize: this.mutationQueue.length,
performanceMetrics: this.getPerformanceStats()
};
}

View File

@@ -1,243 +0,0 @@
/**
* Intent classifier for workflow mutations
* Analyzes operations to determine the intent/pattern of the mutation
*/
import { DiffOperation } from '../types/workflow-diff.js';
import { IntentClassification } from './mutation-types.js';
/**
* Classifies the intent of a workflow mutation based on operations performed
*/
export class IntentClassifier {
/**
* Classify mutation intent from operations and optional user intent text
*/
classify(operations: DiffOperation[], userIntent?: string): IntentClassification {
if (operations.length === 0) {
return IntentClassification.UNKNOWN;
}
// First, try to classify from user intent text if provided
if (userIntent) {
const textClassification = this.classifyFromText(userIntent);
if (textClassification !== IntentClassification.UNKNOWN) {
return textClassification;
}
}
// Fall back to operation pattern analysis
return this.classifyFromOperations(operations);
}
/**
* Classify from user intent text using keyword matching
*/
private classifyFromText(intent: string): IntentClassification {
const lowerIntent = intent.toLowerCase();
// Fix validation errors
if (
lowerIntent.includes('fix') ||
lowerIntent.includes('resolve') ||
lowerIntent.includes('correct') ||
lowerIntent.includes('repair') ||
lowerIntent.includes('error')
) {
return IntentClassification.FIX_VALIDATION;
}
// Add new functionality
if (
lowerIntent.includes('add') ||
lowerIntent.includes('create') ||
lowerIntent.includes('insert') ||
lowerIntent.includes('new node')
) {
return IntentClassification.ADD_FUNCTIONALITY;
}
// Modify configuration
if (
lowerIntent.includes('update') ||
lowerIntent.includes('change') ||
lowerIntent.includes('modify') ||
lowerIntent.includes('configure') ||
lowerIntent.includes('set')
) {
return IntentClassification.MODIFY_CONFIGURATION;
}
// Rewire logic
if (
lowerIntent.includes('connect') ||
lowerIntent.includes('reconnect') ||
lowerIntent.includes('rewire') ||
lowerIntent.includes('reroute') ||
lowerIntent.includes('link')
) {
return IntentClassification.REWIRE_LOGIC;
}
// Cleanup
if (
lowerIntent.includes('remove') ||
lowerIntent.includes('delete') ||
lowerIntent.includes('clean') ||
lowerIntent.includes('disable')
) {
return IntentClassification.CLEANUP;
}
return IntentClassification.UNKNOWN;
}
/**
* Classify from operation patterns
*/
private classifyFromOperations(operations: DiffOperation[]): IntentClassification {
const opTypes = operations.map((op) => op.type);
const opTypeSet = new Set(opTypes);
// Pattern: Adding nodes and connections (add functionality)
if (opTypeSet.has('addNode') && opTypeSet.has('addConnection')) {
return IntentClassification.ADD_FUNCTIONALITY;
}
// Pattern: Only adding nodes (add functionality)
if (opTypeSet.has('addNode') && !opTypeSet.has('removeNode')) {
return IntentClassification.ADD_FUNCTIONALITY;
}
// Pattern: Removing nodes or connections (cleanup)
if (opTypeSet.has('removeNode') || opTypeSet.has('removeConnection')) {
return IntentClassification.CLEANUP;
}
// Pattern: Disabling nodes (cleanup)
if (opTypeSet.has('disableNode')) {
return IntentClassification.CLEANUP;
}
// Pattern: Rewiring connections
if (
opTypeSet.has('rewireConnection') ||
opTypeSet.has('replaceConnections') ||
(opTypeSet.has('addConnection') && opTypeSet.has('removeConnection'))
) {
return IntentClassification.REWIRE_LOGIC;
}
// Pattern: Only updating nodes (modify configuration)
if (opTypeSet.has('updateNode') && opTypes.every((t) => t === 'updateNode')) {
return IntentClassification.MODIFY_CONFIGURATION;
}
// Pattern: Updating settings or metadata (modify configuration)
if (
opTypeSet.has('updateSettings') ||
opTypeSet.has('updateName') ||
opTypeSet.has('addTag') ||
opTypeSet.has('removeTag')
) {
return IntentClassification.MODIFY_CONFIGURATION;
}
// Pattern: Mix of updates with some additions/removals (modify configuration)
if (opTypeSet.has('updateNode')) {
return IntentClassification.MODIFY_CONFIGURATION;
}
// Pattern: Moving nodes (modify configuration)
if (opTypeSet.has('moveNode')) {
return IntentClassification.MODIFY_CONFIGURATION;
}
// Pattern: Enabling nodes (could be fixing)
if (opTypeSet.has('enableNode')) {
return IntentClassification.FIX_VALIDATION;
}
// Pattern: Clean stale connections (cleanup)
if (opTypeSet.has('cleanStaleConnections')) {
return IntentClassification.CLEANUP;
}
return IntentClassification.UNKNOWN;
}
/**
* Get confidence score for classification (0-1)
* Higher score means more confident in the classification
*/
getConfidence(
classification: IntentClassification,
operations: DiffOperation[],
userIntent?: string
): number {
// High confidence if user intent matches operation pattern
if (userIntent && this.classifyFromText(userIntent) === classification) {
return 0.9;
}
// Medium-high confidence for clear operation patterns
if (classification !== IntentClassification.UNKNOWN) {
const opTypes = new Set(operations.map((op) => op.type));
// Very clear patterns get high confidence
if (
classification === IntentClassification.ADD_FUNCTIONALITY &&
opTypes.has('addNode')
) {
return 0.8;
}
if (
classification === IntentClassification.CLEANUP &&
(opTypes.has('removeNode') || opTypes.has('removeConnection'))
) {
return 0.8;
}
if (
classification === IntentClassification.REWIRE_LOGIC &&
opTypes.has('rewireConnection')
) {
return 0.8;
}
// Other patterns get medium confidence
return 0.6;
}
// Low confidence for unknown classification
return 0.3;
}
/**
* Get human-readable description of the classification
*/
getDescription(classification: IntentClassification): string {
switch (classification) {
case IntentClassification.ADD_FUNCTIONALITY:
return 'Adding new nodes or functionality to the workflow';
case IntentClassification.MODIFY_CONFIGURATION:
return 'Modifying configuration of existing nodes';
case IntentClassification.REWIRE_LOGIC:
return 'Changing workflow execution flow by rewiring connections';
case IntentClassification.FIX_VALIDATION:
return 'Fixing validation errors or issues';
case IntentClassification.CLEANUP:
return 'Removing or disabling nodes and connections';
case IntentClassification.UNKNOWN:
return 'Unknown or complex mutation pattern';
default:
return 'Unclassified mutation';
}
}
}
/**
* Singleton instance for easy access
*/
export const intentClassifier = new IntentClassifier();

View File

@@ -1,187 +0,0 @@
/**
* Intent sanitizer for removing PII from user intent strings
* Ensures privacy by masking sensitive information
*/
/**
* Patterns for detecting and removing PII
*/
const PII_PATTERNS = {
// Email addresses
email: /\b[A-Za-z0-9._%+-]+@[A-Za-z0-9.-]+\.[A-Z|a-z]{2,}\b/gi,
// URLs with domains
url: /https?:\/\/[^\s]+/gi,
// IP addresses
ip: /\b(?:\d{1,3}\.){3}\d{1,3}\b/g,
// Phone numbers (various formats)
phone: /\b(?:\+?\d{1,3}[-.\s]?)?\(?\d{3}\)?[-.\s]?\d{3}[-.\s]?\d{4}\b/g,
// Credit card-like numbers (groups of 4 digits)
creditCard: /\b\d{4}[-\s]?\d{4}[-\s]?\d{4}[-\s]?\d{4}\b/g,
// API keys and tokens (long alphanumeric strings)
apiKey: /\b[A-Za-z0-9_-]{32,}\b/g,
// UUIDs
uuid: /\b[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}\b/gi,
// File paths (Unix and Windows)
filePath: /(?:\/[\w.-]+)+\/?|(?:[A-Z]:\\(?:[\w.-]+\\)*[\w.-]+)/g,
// Potential passwords or secrets (common patterns)
secret: /\b(?:password|passwd|pwd|secret|token|key)[:=\s]+[^\s]+/gi,
};
/**
* Company/organization name patterns to anonymize
* These are common patterns that might appear in workflow intents
*/
const COMPANY_PATTERNS = {
// Company suffixes
companySuffix: /\b\w+(?:\s+(?:Inc|LLC|Corp|Corporation|Ltd|Limited|GmbH|AG)\.?)\b/gi,
// Common business terms that might indicate company names
businessContext: /\b(?:company|organization|client|customer)\s+(?:named?|called)\s+\w+/gi,
};
/**
* Sanitizes user intent by removing PII and sensitive information
*/
export class IntentSanitizer {
/**
* Sanitize user intent string
*/
sanitize(intent: string): string {
if (!intent) {
return intent;
}
let sanitized = intent;
// Remove email addresses
sanitized = sanitized.replace(PII_PATTERNS.email, '[EMAIL]');
// Remove URLs
sanitized = sanitized.replace(PII_PATTERNS.url, '[URL]');
// Remove IP addresses
sanitized = sanitized.replace(PII_PATTERNS.ip, '[IP_ADDRESS]');
// Remove phone numbers
sanitized = sanitized.replace(PII_PATTERNS.phone, '[PHONE]');
// Remove credit card numbers
sanitized = sanitized.replace(PII_PATTERNS.creditCard, '[CARD_NUMBER]');
// Remove API keys and long tokens
sanitized = sanitized.replace(PII_PATTERNS.apiKey, '[API_KEY]');
// Remove UUIDs
sanitized = sanitized.replace(PII_PATTERNS.uuid, '[UUID]');
// Remove file paths
sanitized = sanitized.replace(PII_PATTERNS.filePath, '[FILE_PATH]');
// Remove secrets/passwords
sanitized = sanitized.replace(PII_PATTERNS.secret, '[SECRET]');
// Anonymize company names
sanitized = sanitized.replace(COMPANY_PATTERNS.companySuffix, '[COMPANY]');
sanitized = sanitized.replace(COMPANY_PATTERNS.businessContext, '[COMPANY_CONTEXT]');
// Clean up multiple spaces
sanitized = sanitized.replace(/\s{2,}/g, ' ').trim();
return sanitized;
}
/**
* Check if intent contains potential PII
*/
containsPII(intent: string): boolean {
if (!intent) {
return false;
}
return Object.values(PII_PATTERNS).some((pattern) => pattern.test(intent));
}
/**
* Get list of PII types detected in the intent
*/
detectPIITypes(intent: string): string[] {
if (!intent) {
return [];
}
const detected: string[] = [];
if (PII_PATTERNS.email.test(intent)) detected.push('email');
if (PII_PATTERNS.url.test(intent)) detected.push('url');
if (PII_PATTERNS.ip.test(intent)) detected.push('ip_address');
if (PII_PATTERNS.phone.test(intent)) detected.push('phone');
if (PII_PATTERNS.creditCard.test(intent)) detected.push('credit_card');
if (PII_PATTERNS.apiKey.test(intent)) detected.push('api_key');
if (PII_PATTERNS.uuid.test(intent)) detected.push('uuid');
if (PII_PATTERNS.filePath.test(intent)) detected.push('file_path');
if (PII_PATTERNS.secret.test(intent)) detected.push('secret');
// Reset lastIndex for global regexes
Object.values(PII_PATTERNS).forEach((pattern) => {
pattern.lastIndex = 0;
});
return detected;
}
/**
* Truncate intent to maximum length while preserving meaning
*/
truncate(intent: string, maxLength: number = 1000): string {
if (!intent || intent.length <= maxLength) {
return intent;
}
// Try to truncate at sentence boundary
const truncated = intent.substring(0, maxLength);
const lastSentence = truncated.lastIndexOf('.');
const lastSpace = truncated.lastIndexOf(' ');
if (lastSentence > maxLength * 0.8) {
return truncated.substring(0, lastSentence + 1);
} else if (lastSpace > maxLength * 0.9) {
return truncated.substring(0, lastSpace) + '...';
}
return truncated + '...';
}
/**
* Validate intent is safe for telemetry
*/
isSafeForTelemetry(intent: string): boolean {
if (!intent) {
return true;
}
// Check length
if (intent.length > 5000) {
return false;
}
// Check for null bytes or control characters
if (/[\x00-\x08\x0B\x0C\x0E-\x1F]/.test(intent)) {
return false;
}
return true;
}
}
/**
* Singleton instance for easy access
*/
export const intentSanitizer = new IntentSanitizer();

View File

@@ -1,283 +0,0 @@
/**
* Core mutation tracker for workflow transformations
* Coordinates validation, classification, and metric calculation
*/
import { DiffOperation } from '../types/workflow-diff.js';
import {
WorkflowMutationData,
WorkflowMutationRecord,
MutationChangeMetrics,
MutationValidationMetrics,
IntentClassification,
} from './mutation-types.js';
import { intentClassifier } from './intent-classifier.js';
import { mutationValidator } from './mutation-validator.js';
import { intentSanitizer } from './intent-sanitizer.js';
import { WorkflowSanitizer } from './workflow-sanitizer.js';
import { logger } from '../utils/logger.js';
/**
* Tracks workflow mutations and prepares data for telemetry
*/
export class MutationTracker {
private recentMutations: Array<{
hashBefore: string;
hashAfter: string;
operations: DiffOperation[];
}> = [];
private readonly RECENT_MUTATIONS_LIMIT = 100;
/**
* Process and prepare mutation data for tracking
*/
async processMutation(data: WorkflowMutationData, userId: string): Promise<WorkflowMutationRecord | null> {
try {
// Validate data quality
if (!this.validateMutationData(data)) {
logger.debug('Mutation data validation failed');
return null;
}
// Sanitize workflows to remove credentials and sensitive data
const workflowBefore = WorkflowSanitizer.sanitizeWorkflowRaw(data.workflowBefore);
const workflowAfter = WorkflowSanitizer.sanitizeWorkflowRaw(data.workflowAfter);
// Sanitize user intent
const sanitizedIntent = intentSanitizer.sanitize(data.userIntent);
// Check if should be excluded
if (mutationValidator.shouldExclude(data)) {
logger.debug('Mutation excluded from tracking based on quality criteria');
return null;
}
// Check for duplicates
if (
mutationValidator.isDuplicate(
workflowBefore,
workflowAfter,
data.operations,
this.recentMutations
)
) {
logger.debug('Duplicate mutation detected, skipping tracking');
return null;
}
// Generate hashes
const hashBefore = mutationValidator.hashWorkflow(workflowBefore);
const hashAfter = mutationValidator.hashWorkflow(workflowAfter);
// Generate structural hashes for cross-referencing with telemetry_workflows
const structureHashBefore = WorkflowSanitizer.generateWorkflowHash(workflowBefore);
const structureHashAfter = WorkflowSanitizer.generateWorkflowHash(workflowAfter);
// Classify intent
const intentClassification = intentClassifier.classify(data.operations, sanitizedIntent);
// Calculate metrics
const changeMetrics = this.calculateChangeMetrics(data.operations);
const validationMetrics = this.calculateValidationMetrics(
data.validationBefore,
data.validationAfter
);
// Create mutation record
const record: WorkflowMutationRecord = {
userId,
sessionId: data.sessionId,
workflowBefore,
workflowAfter,
workflowHashBefore: hashBefore,
workflowHashAfter: hashAfter,
workflowStructureHashBefore: structureHashBefore,
workflowStructureHashAfter: structureHashAfter,
userIntent: sanitizedIntent,
intentClassification,
toolName: data.toolName,
operations: data.operations,
operationCount: data.operations.length,
operationTypes: this.extractOperationTypes(data.operations),
validationBefore: data.validationBefore,
validationAfter: data.validationAfter,
...validationMetrics,
...changeMetrics,
mutationSuccess: data.mutationSuccess,
mutationError: data.mutationError,
durationMs: data.durationMs,
};
// Store in recent mutations for deduplication
this.addToRecentMutations(hashBefore, hashAfter, data.operations);
return record;
} catch (error) {
logger.error('Error processing mutation:', error);
return null;
}
}
/**
* Validate mutation data
*/
private validateMutationData(data: WorkflowMutationData): boolean {
const validationResult = mutationValidator.validate(data);
if (!validationResult.valid) {
logger.warn('Mutation data validation failed:', validationResult.errors);
return false;
}
if (validationResult.warnings.length > 0) {
logger.debug('Mutation data validation warnings:', validationResult.warnings);
}
return true;
}
/**
* Calculate change metrics from operations
*/
private calculateChangeMetrics(operations: DiffOperation[]): MutationChangeMetrics {
const metrics: MutationChangeMetrics = {
nodesAdded: 0,
nodesRemoved: 0,
nodesModified: 0,
connectionsAdded: 0,
connectionsRemoved: 0,
propertiesChanged: 0,
};
for (const op of operations) {
switch (op.type) {
case 'addNode':
metrics.nodesAdded++;
break;
case 'removeNode':
metrics.nodesRemoved++;
break;
case 'updateNode':
metrics.nodesModified++;
if ('updates' in op && op.updates) {
metrics.propertiesChanged += Object.keys(op.updates as any).length;
}
break;
case 'addConnection':
metrics.connectionsAdded++;
break;
case 'removeConnection':
metrics.connectionsRemoved++;
break;
case 'rewireConnection':
// Rewiring is effectively removing + adding
metrics.connectionsRemoved++;
metrics.connectionsAdded++;
break;
case 'replaceConnections':
// Count how many connections are being replaced
if ('connections' in op && op.connections) {
metrics.connectionsRemoved++;
metrics.connectionsAdded++;
}
break;
case 'updateSettings':
if ('settings' in op && op.settings) {
metrics.propertiesChanged += Object.keys(op.settings as any).length;
}
break;
case 'moveNode':
case 'enableNode':
case 'disableNode':
case 'updateName':
case 'addTag':
case 'removeTag':
case 'activateWorkflow':
case 'deactivateWorkflow':
case 'cleanStaleConnections':
// These don't directly affect node/connection counts
// but count as property changes
metrics.propertiesChanged++;
break;
}
}
return metrics;
}
/**
* Calculate validation improvement metrics
*/
private calculateValidationMetrics(
validationBefore: any,
validationAfter: any
): MutationValidationMetrics {
// If validation data is missing, return nulls
if (!validationBefore || !validationAfter) {
return {
validationImproved: null,
errorsResolved: 0,
errorsIntroduced: 0,
};
}
const errorsBefore = validationBefore.errors?.length || 0;
const errorsAfter = validationAfter.errors?.length || 0;
const errorsResolved = Math.max(0, errorsBefore - errorsAfter);
const errorsIntroduced = Math.max(0, errorsAfter - errorsBefore);
const validationImproved = errorsBefore > errorsAfter;
return {
validationImproved,
errorsResolved,
errorsIntroduced,
};
}
/**
* Extract unique operation types from operations
*/
private extractOperationTypes(operations: DiffOperation[]): string[] {
const types = new Set(operations.map((op) => op.type));
return Array.from(types);
}
/**
* Add mutation to recent list for deduplication
*/
private addToRecentMutations(
hashBefore: string,
hashAfter: string,
operations: DiffOperation[]
): void {
this.recentMutations.push({ hashBefore, hashAfter, operations });
// Keep only recent mutations
if (this.recentMutations.length > this.RECENT_MUTATIONS_LIMIT) {
this.recentMutations.shift();
}
}
/**
* Clear recent mutations (useful for testing)
*/
clearRecentMutations(): void {
this.recentMutations = [];
}
/**
* Get statistics about tracked mutations
*/
getRecentMutationsCount(): number {
return this.recentMutations.length;
}
}
/**
* Singleton instance for easy access
*/
export const mutationTracker = new MutationTracker();

View File

@@ -1,160 +0,0 @@
/**
* Types and interfaces for workflow mutation tracking
* Purpose: Track workflow transformations to improve partial updates tooling
*/
import { DiffOperation } from '../types/workflow-diff.js';
/**
* Intent classification for workflow mutations
*/
export enum IntentClassification {
ADD_FUNCTIONALITY = 'add_functionality',
MODIFY_CONFIGURATION = 'modify_configuration',
REWIRE_LOGIC = 'rewire_logic',
FIX_VALIDATION = 'fix_validation',
CLEANUP = 'cleanup',
UNKNOWN = 'unknown',
}
/**
* Tool names that perform workflow mutations
*/
export enum MutationToolName {
UPDATE_PARTIAL = 'n8n_update_partial_workflow',
UPDATE_FULL = 'n8n_update_full_workflow',
}
/**
* Validation result structure
*/
export interface ValidationResult {
valid: boolean;
errors: Array<{
type: string;
message: string;
severity?: string;
location?: string;
}>;
warnings?: Array<{
type: string;
message: string;
}>;
}
/**
* Change metrics calculated from workflow mutation
*/
export interface MutationChangeMetrics {
nodesAdded: number;
nodesRemoved: number;
nodesModified: number;
connectionsAdded: number;
connectionsRemoved: number;
propertiesChanged: number;
}
/**
* Validation improvement metrics
*/
export interface MutationValidationMetrics {
validationImproved: boolean | null;
errorsResolved: number;
errorsIntroduced: number;
}
/**
* Input data for tracking a workflow mutation
*/
export interface WorkflowMutationData {
sessionId: string;
toolName: MutationToolName;
userIntent: string;
operations: DiffOperation[];
workflowBefore: any;
workflowAfter: any;
validationBefore?: ValidationResult;
validationAfter?: ValidationResult;
mutationSuccess: boolean;
mutationError?: string;
durationMs: number;
}
/**
* Complete mutation record for database storage
*/
export interface WorkflowMutationRecord {
id?: string;
userId: string;
sessionId: string;
workflowBefore: any;
workflowAfter: any;
workflowHashBefore: string;
workflowHashAfter: string;
/** Structural hash (nodeTypes + connections) for cross-referencing with telemetry_workflows */
workflowStructureHashBefore?: string;
/** Structural hash (nodeTypes + connections) for cross-referencing with telemetry_workflows */
workflowStructureHashAfter?: string;
/** Computed field: true if mutation executed successfully, improved validation, and has known intent */
isTrulySuccessful?: boolean;
userIntent: string;
intentClassification: IntentClassification;
toolName: MutationToolName;
operations: DiffOperation[];
operationCount: number;
operationTypes: string[];
validationBefore?: ValidationResult;
validationAfter?: ValidationResult;
validationImproved: boolean | null;
errorsResolved: number;
errorsIntroduced: number;
nodesAdded: number;
nodesRemoved: number;
nodesModified: number;
connectionsAdded: number;
connectionsRemoved: number;
propertiesChanged: number;
mutationSuccess: boolean;
mutationError?: string;
durationMs: number;
createdAt?: Date;
}
/**
* Options for mutation tracking
*/
export interface MutationTrackingOptions {
/** Whether to track this mutation (default: true) */
enabled?: boolean;
/** Maximum workflow size in KB to track (default: 500) */
maxWorkflowSizeKb?: number;
/** Whether to validate data quality before tracking (default: true) */
validateQuality?: boolean;
/** Whether to sanitize workflows for PII (default: true) */
sanitize?: boolean;
}
/**
* Mutation tracking statistics for monitoring
*/
export interface MutationTrackingStats {
totalMutationsTracked: number;
successfulMutations: number;
failedMutations: number;
mutationsWithValidationImprovement: number;
averageDurationMs: number;
intentClassificationBreakdown: Record<IntentClassification, number>;
operationTypeBreakdown: Record<string, number>;
}
/**
* Data quality validation result
*/
export interface MutationDataQualityResult {
valid: boolean;
errors: string[];
warnings: string[];
}

View File

@@ -1,237 +0,0 @@
/**
* Data quality validator for workflow mutations
* Ensures mutation data meets quality standards before tracking
*/
import { createHash } from 'crypto';
import {
WorkflowMutationData,
MutationDataQualityResult,
MutationTrackingOptions,
} from './mutation-types.js';
/**
* Default options for mutation tracking
*/
export const DEFAULT_MUTATION_TRACKING_OPTIONS: Required<MutationTrackingOptions> = {
enabled: true,
maxWorkflowSizeKb: 500,
validateQuality: true,
sanitize: true,
};
/**
* Validates workflow mutation data quality
*/
export class MutationValidator {
private options: Required<MutationTrackingOptions>;
constructor(options: MutationTrackingOptions = {}) {
this.options = { ...DEFAULT_MUTATION_TRACKING_OPTIONS, ...options };
}
/**
* Validate mutation data quality
*/
validate(data: WorkflowMutationData): MutationDataQualityResult {
const errors: string[] = [];
const warnings: string[] = [];
// Check workflow structure
if (!this.isValidWorkflow(data.workflowBefore)) {
errors.push('Invalid workflow_before structure');
}
if (!this.isValidWorkflow(data.workflowAfter)) {
errors.push('Invalid workflow_after structure');
}
// Check workflow size
const beforeSizeKb = this.getWorkflowSizeKb(data.workflowBefore);
const afterSizeKb = this.getWorkflowSizeKb(data.workflowAfter);
if (beforeSizeKb > this.options.maxWorkflowSizeKb) {
errors.push(
`workflow_before size (${beforeSizeKb}KB) exceeds maximum (${this.options.maxWorkflowSizeKb}KB)`
);
}
if (afterSizeKb > this.options.maxWorkflowSizeKb) {
errors.push(
`workflow_after size (${afterSizeKb}KB) exceeds maximum (${this.options.maxWorkflowSizeKb}KB)`
);
}
// Check for meaningful change
if (!this.hasMeaningfulChange(data.workflowBefore, data.workflowAfter)) {
warnings.push('No meaningful change detected between before and after workflows');
}
// Check intent quality
if (!data.userIntent || data.userIntent.trim().length === 0) {
warnings.push('User intent is empty');
} else if (data.userIntent.trim().length < 5) {
warnings.push('User intent is too short (less than 5 characters)');
} else if (data.userIntent.length > 1000) {
warnings.push('User intent is very long (over 1000 characters)');
}
// Check operations
if (!data.operations || data.operations.length === 0) {
errors.push('No operations provided');
}
// Check validation data consistency
if (data.validationBefore && data.validationAfter) {
if (typeof data.validationBefore.valid !== 'boolean') {
warnings.push('Invalid validation_before structure');
}
if (typeof data.validationAfter.valid !== 'boolean') {
warnings.push('Invalid validation_after structure');
}
}
// Check duration sanity
if (data.durationMs !== undefined) {
if (data.durationMs < 0) {
errors.push('Duration cannot be negative');
}
if (data.durationMs > 300000) {
// 5 minutes
warnings.push('Duration is very long (over 5 minutes)');
}
}
return {
valid: errors.length === 0,
errors,
warnings,
};
}
/**
* Check if workflow has valid structure
*/
private isValidWorkflow(workflow: any): boolean {
if (!workflow || typeof workflow !== 'object') {
return false;
}
// Must have nodes array
if (!Array.isArray(workflow.nodes)) {
return false;
}
// Must have connections object
if (!workflow.connections || typeof workflow.connections !== 'object') {
return false;
}
return true;
}
/**
* Get workflow size in KB
*/
private getWorkflowSizeKb(workflow: any): number {
try {
const json = JSON.stringify(workflow);
return json.length / 1024;
} catch {
return 0;
}
}
/**
* Check if there's meaningful change between workflows
*/
private hasMeaningfulChange(workflowBefore: any, workflowAfter: any): boolean {
try {
// Compare hashes
const hashBefore = this.hashWorkflow(workflowBefore);
const hashAfter = this.hashWorkflow(workflowAfter);
return hashBefore !== hashAfter;
} catch {
return false;
}
}
/**
* Hash workflow for comparison
*/
hashWorkflow(workflow: any): string {
try {
const json = JSON.stringify(workflow);
return createHash('sha256').update(json).digest('hex').substring(0, 16);
} catch {
return '';
}
}
/**
* Check if mutation should be excluded from tracking
*/
shouldExclude(data: WorkflowMutationData): boolean {
// Exclude if not successful and no error message
if (!data.mutationSuccess && !data.mutationError) {
return true;
}
// Exclude if workflows are identical
if (!this.hasMeaningfulChange(data.workflowBefore, data.workflowAfter)) {
return true;
}
// Exclude if workflow size exceeds limits
const beforeSizeKb = this.getWorkflowSizeKb(data.workflowBefore);
const afterSizeKb = this.getWorkflowSizeKb(data.workflowAfter);
if (
beforeSizeKb > this.options.maxWorkflowSizeKb ||
afterSizeKb > this.options.maxWorkflowSizeKb
) {
return true;
}
return false;
}
/**
* Check for duplicate mutation (same hash + operations)
*/
isDuplicate(
workflowBefore: any,
workflowAfter: any,
operations: any[],
recentMutations: Array<{ hashBefore: string; hashAfter: string; operations: any[] }>
): boolean {
const hashBefore = this.hashWorkflow(workflowBefore);
const hashAfter = this.hashWorkflow(workflowAfter);
const operationsHash = this.hashOperations(operations);
return recentMutations.some(
(m) =>
m.hashBefore === hashBefore &&
m.hashAfter === hashAfter &&
this.hashOperations(m.operations) === operationsHash
);
}
/**
* Hash operations for deduplication
*/
private hashOperations(operations: any[]): string {
try {
const json = JSON.stringify(operations);
return createHash('sha256').update(json).digest('hex').substring(0, 16);
} catch {
return '';
}
}
}
/**
* Singleton instance for easy access
*/
export const mutationValidator = new MutationValidator();

View File

@@ -148,50 +148,6 @@ export class TelemetryManager {
}
}
/**
* Track workflow mutation from partial updates
*/
async trackWorkflowMutation(data: any): Promise<void> {
this.ensureInitialized();
if (!this.isEnabled()) {
logger.debug('Telemetry disabled, skipping mutation tracking');
return;
}
this.performanceMonitor.startOperation('trackWorkflowMutation');
try {
const { mutationTracker } = await import('./mutation-tracker.js');
const userId = this.configManager.getUserId();
const mutationRecord = await mutationTracker.processMutation(data, userId);
if (mutationRecord) {
// Queue for batch processing
this.eventTracker.enqueueMutation(mutationRecord);
// Auto-flush if queue reaches threshold
// Lower threshold (2) for mutations since they're less frequent than regular events
const queueSize = this.eventTracker.getMutationQueueSize();
if (queueSize >= 2) {
await this.flushMutations();
}
}
} catch (error) {
const telemetryError = error instanceof TelemetryError
? error
: new TelemetryError(
TelemetryErrorType.UNKNOWN_ERROR,
'Failed to track workflow mutation',
{ error: String(error) }
);
this.errorAggregator.record(telemetryError);
logger.debug('Error tracking workflow mutation:', error);
} finally {
this.performanceMonitor.endOperation('trackWorkflowMutation');
}
}
/**
* Track an error event
@@ -265,16 +221,14 @@ export class TelemetryManager {
// Get queued data from event tracker
const events = this.eventTracker.getEventQueue();
const workflows = this.eventTracker.getWorkflowQueue();
const mutations = this.eventTracker.getMutationQueue();
// Clear queues immediately to prevent duplicate processing
this.eventTracker.clearEventQueue();
this.eventTracker.clearWorkflowQueue();
this.eventTracker.clearMutationQueue();
try {
// Use batch processor to flush
await this.batchProcessor.flush(events, workflows, mutations);
await this.batchProcessor.flush(events, workflows);
} catch (error) {
const telemetryError = error instanceof TelemetryError
? error
@@ -294,21 +248,6 @@ export class TelemetryManager {
}
}
/**
* Flush queued mutations only
*/
async flushMutations(): Promise<void> {
this.ensureInitialized();
if (!this.isEnabled() || !this.supabase) return;
const mutations = this.eventTracker.getMutationQueue();
this.eventTracker.clearMutationQueue();
if (mutations.length > 0) {
await this.batchProcessor.flush([], [], mutations);
}
}
/**
* Check if telemetry is enabled

View File

@@ -131,9 +131,4 @@ export interface TelemetryErrorContext {
context?: Record<string, any>;
timestamp: number;
retryable: boolean;
}
/**
* Re-export workflow mutation types
*/
export type { WorkflowMutationRecord, WorkflowMutationData } from './mutation-types.js';
}

View File

@@ -27,32 +27,29 @@ interface SanitizedWorkflow {
workflowHash: string;
}
interface PatternDefinition {
pattern: RegExp;
placeholder: string;
preservePrefix?: boolean; // For patterns like "Bearer [REDACTED]"
}
export class WorkflowSanitizer {
private static readonly SENSITIVE_PATTERNS: PatternDefinition[] = [
private static readonly SENSITIVE_PATTERNS = [
// Webhook URLs (replace with placeholder but keep structure) - MUST BE FIRST
{ pattern: /https?:\/\/[^\s/]+\/webhook\/[^\s]+/g, placeholder: '[REDACTED_WEBHOOK]' },
{ pattern: /https?:\/\/[^\s/]+\/hook\/[^\s]+/g, placeholder: '[REDACTED_WEBHOOK]' },
/https?:\/\/[^\s/]+\/webhook\/[^\s]+/g,
/https?:\/\/[^\s/]+\/hook\/[^\s]+/g,
// URLs with authentication - MUST BE BEFORE BEARER TOKENS
{ pattern: /https?:\/\/[^:]+:[^@]+@[^\s/]+/g, placeholder: '[REDACTED_URL_WITH_AUTH]' },
{ pattern: /wss?:\/\/[^:]+:[^@]+@[^\s/]+/g, placeholder: '[REDACTED_URL_WITH_AUTH]' },
{ pattern: /(?:postgres|mysql|mongodb|redis):\/\/[^:]+:[^@]+@[^\s]+/g, placeholder: '[REDACTED_URL_WITH_AUTH]' }, // Database protocols - includes port and path
// API keys and tokens
/sk-[a-zA-Z0-9]{16,}/g, // OpenAI keys
/Bearer\s+[^\s]+/gi, // Bearer tokens
/[a-zA-Z0-9_-]{20,}/g, // Long alphanumeric strings (API keys) - reduced threshold
/token['":\s]+[^,}]+/gi, // Token fields
/apikey['":\s]+[^,}]+/gi, // API key fields
/api_key['":\s]+[^,}]+/gi,
/secret['":\s]+[^,}]+/gi,
/password['":\s]+[^,}]+/gi,
/credential['":\s]+[^,}]+/gi,
// API keys and tokens - ORDER MATTERS!
// More specific patterns first, then general patterns
{ pattern: /sk-[a-zA-Z0-9]{16,}/g, placeholder: '[REDACTED_APIKEY]' }, // OpenAI keys
{ pattern: /Bearer\s+[^\s]+/gi, placeholder: 'Bearer [REDACTED]', preservePrefix: true }, // Bearer tokens
{ pattern: /\b[a-zA-Z0-9_-]{32,}\b/g, placeholder: '[REDACTED_TOKEN]' }, // Long tokens (32+ chars)
{ pattern: /\b[a-zA-Z0-9_-]{20,31}\b/g, placeholder: '[REDACTED]' }, // Short tokens (20-31 chars)
// URLs with authentication
/https?:\/\/[^:]+:[^@]+@[^\s/]+/g, // URLs with auth
/wss?:\/\/[^:]+:[^@]+@[^\s/]+/g,
// Email addresses (optional - uncomment if needed)
// { pattern: /[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}/g, placeholder: '[REDACTED_EMAIL]' },
// /[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}/g,
];
private static readonly SENSITIVE_FIELDS = [
@@ -181,34 +178,19 @@ export class WorkflowSanitizer {
const sanitized: any = {};
for (const [key, value] of Object.entries(obj)) {
// Check if field name is sensitive
const isSensitive = this.isSensitiveField(key);
const isUrlField = key.toLowerCase().includes('url') ||
key.toLowerCase().includes('endpoint') ||
key.toLowerCase().includes('webhook');
// Check if key is sensitive
if (this.isSensitiveField(key)) {
sanitized[key] = '[REDACTED]';
continue;
}
// Recursively sanitize nested objects (unless it's a sensitive non-URL field)
// Recursively sanitize nested objects
if (typeof value === 'object' && value !== null) {
if (isSensitive && !isUrlField) {
// For sensitive object fields (like 'authentication'), redact completely
sanitized[key] = '[REDACTED]';
} else {
sanitized[key] = this.sanitizeObject(value);
}
sanitized[key] = this.sanitizeObject(value);
}
// Sanitize string values
else if (typeof value === 'string') {
// For sensitive fields (except URL fields), use generic redaction
if (isSensitive && !isUrlField) {
sanitized[key] = '[REDACTED]';
} else {
// For URL fields or non-sensitive fields, use pattern-specific sanitization
sanitized[key] = this.sanitizeString(value, key);
}
}
// For non-string sensitive fields, redact completely
else if (isSensitive) {
sanitized[key] = '[REDACTED]';
sanitized[key] = this.sanitizeString(value, key);
}
// Keep other types as-is
else {
@@ -230,42 +212,13 @@ export class WorkflowSanitizer {
let sanitized = value;
// Apply all sensitive patterns with their specific placeholders
for (const patternDef of this.SENSITIVE_PATTERNS) {
// Apply all sensitive patterns
for (const pattern of this.SENSITIVE_PATTERNS) {
// Skip webhook patterns - already handled above
if (patternDef.placeholder.includes('WEBHOOK')) {
if (pattern.toString().includes('webhook')) {
continue;
}
// Skip if already sanitized with a placeholder to prevent double-redaction
if (sanitized.includes('[REDACTED')) {
break;
}
// Special handling for URL with auth - preserve path after credentials
if (patternDef.placeholder === '[REDACTED_URL_WITH_AUTH]') {
const matches = value.match(patternDef.pattern);
if (matches) {
for (const match of matches) {
// Extract path after the authenticated URL
const fullUrlMatch = value.indexOf(match);
if (fullUrlMatch !== -1) {
const afterUrl = value.substring(fullUrlMatch + match.length);
// If there's a path after the URL, preserve it
if (afterUrl && afterUrl.startsWith('/')) {
const pathPart = afterUrl.split(/[\s?&#]/)[0]; // Get path until query/fragment
sanitized = sanitized.replace(match + pathPart, patternDef.placeholder + pathPart);
} else {
sanitized = sanitized.replace(match, patternDef.placeholder);
}
}
}
}
continue;
}
// Apply pattern with its specific placeholder
sanitized = sanitized.replace(patternDef.pattern, patternDef.placeholder);
sanitized = sanitized.replace(pattern, '[REDACTED]');
}
// Additional sanitization for specific field types
@@ -273,13 +226,9 @@ export class WorkflowSanitizer {
fieldName.toLowerCase().includes('endpoint')) {
// Keep URL structure but remove domain details
if (sanitized.startsWith('http://') || sanitized.startsWith('https://')) {
// If value has been redacted with URL_WITH_AUTH, preserve it
if (sanitized.includes('[REDACTED_URL_WITH_AUTH]')) {
return sanitized; // Already properly sanitized with path preserved
}
// If value has other redactions, leave it as is
// If value has been redacted, leave it as is
if (sanitized.includes('[REDACTED]')) {
return sanitized;
return '[REDACTED]';
}
const urlParts = sanitized.split('/');
if (urlParts.length > 2) {
@@ -347,37 +296,4 @@ export class WorkflowSanitizer {
const sanitized = this.sanitizeWorkflow(workflow);
return sanitized.workflowHash;
}
/**
* Sanitize workflow and return raw workflow object (without metrics)
* For use in telemetry where we need plain workflow structure
*/
static sanitizeWorkflowRaw(workflow: any): any {
// Create a deep copy to avoid modifying original
const sanitized = JSON.parse(JSON.stringify(workflow));
// Sanitize nodes
if (sanitized.nodes && Array.isArray(sanitized.nodes)) {
sanitized.nodes = sanitized.nodes.map((node: WorkflowNode) =>
this.sanitizeNode(node)
);
}
// Sanitize connections (keep structure only)
if (sanitized.connections) {
sanitized.connections = this.sanitizeConnections(sanitized.connections);
}
// Remove other potentially sensitive data
delete sanitized.settings?.errorWorkflow;
delete sanitized.staticData;
delete sanitized.pinData;
delete sanitized.credentials;
delete sanitized.sharedWorkflows;
delete sanitized.ownedBy;
delete sanitized.createdBy;
delete sanitized.updatedBy;
return sanitized;
}
}

View File

@@ -1,6 +1,5 @@
// Export n8n node type definitions and utilities
export * from './node-types';
export * from './type-structures';
export interface MCPServerConfig {
port: number;

View File

@@ -56,7 +56,6 @@ export interface WorkflowSettings {
export interface Workflow {
id?: string;
name: string;
description?: string; // Returned by GET but must be excluded from PUT/PATCH (n8n API limitation, Issue #431)
nodes: WorkflowNode[];
connections: WorkflowConnection;
active?: boolean; // Optional for creation as it's read-only

View File

@@ -1,301 +0,0 @@
/**
* Type Structure Definitions
*
* Defines the structure and validation rules for n8n node property types.
* These structures help validate node configurations and provide better
* AI assistance by clearly defining what each property type expects.
*
* @module types/type-structures
* @since 2.23.0
*/
import type { NodePropertyTypes } from 'n8n-workflow';
/**
* Structure definition for a node property type
*
* Describes the expected data structure, JavaScript type,
* example values, and validation rules for each property type.
*
* @interface TypeStructure
*
* @example
* ```typescript
* const stringStructure: TypeStructure = {
* type: 'primitive',
* jsType: 'string',
* description: 'A text value',
* example: 'Hello World',
* validation: {
* allowEmpty: true,
* allowExpressions: true
* }
* };
* ```
*/
export interface TypeStructure {
/**
* Category of the type
* - primitive: Basic JavaScript types (string, number, boolean)
* - object: Complex object structures
* - array: Array types
* - collection: n8n collection types (nested properties)
* - special: Special n8n types with custom behavior
*/
type: 'primitive' | 'object' | 'array' | 'collection' | 'special';
/**
* Underlying JavaScript type
*/
jsType: 'string' | 'number' | 'boolean' | 'object' | 'array' | 'any';
/**
* Human-readable description of the type
*/
description: string;
/**
* Detailed structure definition for complex types
* Describes the expected shape of the data
*/
structure?: {
/**
* For objects: map of property names to their types
*/
properties?: Record<string, TypePropertyDefinition>;
/**
* For arrays: type of array items
*/
items?: TypePropertyDefinition;
/**
* Whether the structure is flexible (allows additional properties)
*/
flexible?: boolean;
/**
* Required properties (for objects)
*/
required?: string[];
};
/**
* Example value demonstrating correct usage
*/
example: any;
/**
* Additional example values for complex types
*/
examples?: any[];
/**
* Validation rules specific to this type
*/
validation?: {
/**
* Whether empty values are allowed
*/
allowEmpty?: boolean;
/**
* Whether n8n expressions ({{ ... }}) are allowed
*/
allowExpressions?: boolean;
/**
* Minimum value (for numbers)
*/
min?: number;
/**
* Maximum value (for numbers)
*/
max?: number;
/**
* Pattern to match (for strings)
*/
pattern?: string;
/**
* Custom validation function name
*/
customValidator?: string;
};
/**
* Version when this type was introduced
*/
introducedIn?: string;
/**
* Version when this type was deprecated (if applicable)
*/
deprecatedIn?: string;
/**
* Type that replaces this one (if deprecated)
*/
replacedBy?: NodePropertyTypes;
/**
* Additional notes or warnings
*/
notes?: string[];
}
/**
* Property definition within a structure
*/
export interface TypePropertyDefinition {
/**
* Type of this property
*/
type: 'string' | 'number' | 'boolean' | 'object' | 'array' | 'any';
/**
* Description of this property
*/
description?: string;
/**
* Whether this property is required
*/
required?: boolean;
/**
* Nested properties (for object types)
*/
properties?: Record<string, TypePropertyDefinition>;
/**
* Type of array items (for array types)
*/
items?: TypePropertyDefinition;
/**
* Example value
*/
example?: any;
/**
* Allowed values (enum)
*/
enum?: Array<string | number | boolean>;
/**
* Whether this structure allows additional properties beyond those defined
*/
flexible?: boolean;
}
/**
* Complex property types that have nested structures
*
* These types require special handling and validation
* beyond simple type checking.
*/
export type ComplexPropertyType =
| 'collection'
| 'fixedCollection'
| 'resourceLocator'
| 'resourceMapper'
| 'filter'
| 'assignmentCollection';
/**
* Primitive property types (simple values)
*
* These types map directly to JavaScript primitives
* and don't require complex validation.
*/
export type PrimitivePropertyType =
| 'string'
| 'number'
| 'boolean'
| 'dateTime'
| 'color'
| 'json';
/**
* Type guard to check if a property type is complex
*
* Complex types have nested structures and require
* special validation logic.
*
* @param type - The property type to check
* @returns True if the type is complex
*
* @example
* ```typescript
* if (isComplexType('collection')) {
* // Handle complex type
* }
* ```
*/
export function isComplexType(type: NodePropertyTypes): type is ComplexPropertyType {
return (
type === 'collection' ||
type === 'fixedCollection' ||
type === 'resourceLocator' ||
type === 'resourceMapper' ||
type === 'filter' ||
type === 'assignmentCollection'
);
}
/**
* Type guard to check if a property type is primitive
*
* Primitive types map to simple JavaScript values
* and only need basic type validation.
*
* @param type - The property type to check
* @returns True if the type is primitive
*
* @example
* ```typescript
* if (isPrimitiveType('string')) {
* // Handle as primitive
* }
* ```
*/
export function isPrimitiveType(type: NodePropertyTypes): type is PrimitivePropertyType {
return (
type === 'string' ||
type === 'number' ||
type === 'boolean' ||
type === 'dateTime' ||
type === 'color' ||
type === 'json'
);
}
/**
* Type guard to check if a value is a valid TypeStructure
*
* @param value - The value to check
* @returns True if the value conforms to TypeStructure interface
*
* @example
* ```typescript
* const maybeStructure = getStructureFromSomewhere();
* if (isTypeStructure(maybeStructure)) {
* console.log(maybeStructure.example);
* }
* ```
*/
export function isTypeStructure(value: any): value is TypeStructure {
return (
value !== null &&
typeof value === 'object' &&
'type' in value &&
'jsType' in value &&
'description' in value &&
'example' in value &&
['primitive', 'object', 'array', 'collection', 'special'].includes(value.type) &&
['string', 'number', 'boolean', 'object', 'array', 'any'].includes(value.jsType)
);
}

View File

@@ -114,16 +114,6 @@ export interface RemoveTagOperation extends DiffOperation {
tag: string;
}
export interface ActivateWorkflowOperation extends DiffOperation {
type: 'activateWorkflow';
// No additional properties needed - just activates the workflow
}
export interface DeactivateWorkflowOperation extends DiffOperation {
type: 'deactivateWorkflow';
// No additional properties needed - just deactivates the workflow
}
// Connection Cleanup Operations
export interface CleanStaleConnectionsOperation extends DiffOperation {
type: 'cleanStaleConnections';
@@ -158,8 +148,6 @@ export type WorkflowDiffOperation =
| UpdateNameOperation
| AddTagOperation
| RemoveTagOperation
| ActivateWorkflowOperation
| DeactivateWorkflowOperation
| CleanStaleConnectionsOperation
| ReplaceConnectionsOperation;
@@ -188,8 +176,6 @@ export interface WorkflowDiffResult {
applied?: number[]; // Indices of successfully applied operations (when continueOnError is true)
failed?: number[]; // Indices of failed operations (when continueOnError is true)
staleConnectionsRemoved?: Array<{ from: string; to: string }>; // For cleanStaleConnections operation
shouldActivate?: boolean; // Flag to activate workflow after update (for activateWorkflow operation)
shouldDeactivate?: boolean; // Flag to deactivate workflow after update (for deactivateWorkflow operation)
}
// Helper type for node reference (supports both ID and name)

View File

@@ -101,6 +101,7 @@ describe('Integration: handleListAvailableTools', () => {
// Common known limitations
const limitationsText = data.limitations.join(' ');
expect(limitationsText).toContain('Cannot activate');
expect(limitationsText).toContain('Cannot execute workflows directly');
});
});

View File

@@ -1,499 +0,0 @@
import { describe, it, expect, beforeAll, afterAll } from 'vitest';
import { createDatabaseAdapter, DatabaseAdapter } from '../../../src/database/database-adapter';
import { EnhancedConfigValidator } from '../../../src/services/enhanced-config-validator';
import type { NodePropertyTypes } from 'n8n-workflow';
import { gunzipSync } from 'zlib';
/**
* Integration tests for Phase 3: Real-World Type Structure Validation
*
* Tests the EnhancedConfigValidator against actual workflow templates from n8n.io
* to ensure type structure validation works in production scenarios.
*
* Success Criteria (from implementation plan):
* - Pass Rate: >95%
* - False Positive Rate: <5%
* - Performance: <50ms per validation
*/
describe('Integration: Real-World Type Structure Validation', () => {
let db: DatabaseAdapter;
const SAMPLE_SIZE = 20; // Use smaller sample for fast tests
const SPECIAL_TYPES: NodePropertyTypes[] = [
'filter',
'resourceMapper',
'assignmentCollection',
'resourceLocator',
];
beforeAll(async () => {
// Connect to production database
db = await createDatabaseAdapter('./data/nodes.db');
});
afterAll(() => {
if (db && 'close' in db && typeof db.close === 'function') {
db.close();
}
});
function decompressWorkflow(compressed: string): any {
const buffer = Buffer.from(compressed, 'base64');
const decompressed = gunzipSync(buffer);
return JSON.parse(decompressed.toString('utf-8'));
}
function inferPropertyType(value: any): NodePropertyTypes | null {
if (!value || typeof value !== 'object') return null;
if (value.combinator && value.conditions) return 'filter';
if (value.mappingMode) return 'resourceMapper';
if (value.assignments && Array.isArray(value.assignments)) return 'assignmentCollection';
if (value.mode && value.hasOwnProperty('value')) return 'resourceLocator';
return null;
}
function extractNodesWithSpecialTypes(workflowJson: any) {
const results: Array<any> = [];
if (!workflowJson?.nodes || !Array.isArray(workflowJson.nodes)) {
return results;
}
for (const node of workflowJson.nodes) {
if (!node.parameters || typeof node.parameters !== 'object') continue;
const specialProperties: Array<any> = [];
for (const [paramName, paramValue] of Object.entries(node.parameters)) {
const inferredType = inferPropertyType(paramValue);
if (inferredType && SPECIAL_TYPES.includes(inferredType)) {
specialProperties.push({
name: paramName,
type: inferredType,
value: paramValue,
});
}
}
if (specialProperties.length > 0) {
results.push({
nodeId: node.id,
nodeName: node.name,
nodeType: node.type,
properties: specialProperties,
});
}
}
return results;
}
it('should have templates database available', () => {
const result = db.prepare('SELECT COUNT(*) as count FROM templates').get() as any;
expect(result.count).toBeGreaterThan(0);
});
it('should validate filter type structures from real templates', async () => {
const templates = db.prepare(`
SELECT id, name, workflow_json_compressed, views
FROM templates
WHERE workflow_json_compressed IS NOT NULL
ORDER BY views DESC
LIMIT ?
`).all(SAMPLE_SIZE) as any[];
let filterValidations = 0;
let filterPassed = 0;
for (const template of templates) {
const workflow = decompressWorkflow(template.workflow_json_compressed);
const nodes = extractNodesWithSpecialTypes(workflow);
for (const node of nodes) {
for (const prop of node.properties) {
if (prop.type !== 'filter') continue;
filterValidations++;
const startTime = Date.now();
const properties = [{
name: prop.name,
type: 'filter' as NodePropertyTypes,
required: true,
displayName: prop.name,
default: {},
}];
const config = { [prop.name]: prop.value };
const result = EnhancedConfigValidator.validateWithMode(
node.nodeType,
config,
properties,
'operation',
'ai-friendly'
);
const timeMs = Date.now() - startTime;
expect(timeMs).toBeLessThan(50); // Performance target
if (result.valid) {
filterPassed++;
}
}
}
}
if (filterValidations > 0) {
const passRate = (filterPassed / filterValidations) * 100;
expect(passRate).toBeGreaterThanOrEqual(95); // Success criteria
}
});
it('should validate resourceMapper type structures from real templates', async () => {
const templates = db.prepare(`
SELECT id, name, workflow_json_compressed, views
FROM templates
WHERE workflow_json_compressed IS NOT NULL
ORDER BY views DESC
LIMIT ?
`).all(SAMPLE_SIZE) as any[];
let resourceMapperValidations = 0;
let resourceMapperPassed = 0;
for (const template of templates) {
const workflow = decompressWorkflow(template.workflow_json_compressed);
const nodes = extractNodesWithSpecialTypes(workflow);
for (const node of nodes) {
for (const prop of node.properties) {
if (prop.type !== 'resourceMapper') continue;
resourceMapperValidations++;
const startTime = Date.now();
const properties = [{
name: prop.name,
type: 'resourceMapper' as NodePropertyTypes,
required: true,
displayName: prop.name,
default: {},
}];
const config = { [prop.name]: prop.value };
const result = EnhancedConfigValidator.validateWithMode(
node.nodeType,
config,
properties,
'operation',
'ai-friendly'
);
const timeMs = Date.now() - startTime;
expect(timeMs).toBeLessThan(50);
if (result.valid) {
resourceMapperPassed++;
}
}
}
}
if (resourceMapperValidations > 0) {
const passRate = (resourceMapperPassed / resourceMapperValidations) * 100;
expect(passRate).toBeGreaterThanOrEqual(95);
}
});
it('should validate assignmentCollection type structures from real templates', async () => {
const templates = db.prepare(`
SELECT id, name, workflow_json_compressed, views
FROM templates
WHERE workflow_json_compressed IS NOT NULL
ORDER BY views DESC
LIMIT ?
`).all(SAMPLE_SIZE) as any[];
let assignmentValidations = 0;
let assignmentPassed = 0;
for (const template of templates) {
const workflow = decompressWorkflow(template.workflow_json_compressed);
const nodes = extractNodesWithSpecialTypes(workflow);
for (const node of nodes) {
for (const prop of node.properties) {
if (prop.type !== 'assignmentCollection') continue;
assignmentValidations++;
const startTime = Date.now();
const properties = [{
name: prop.name,
type: 'assignmentCollection' as NodePropertyTypes,
required: true,
displayName: prop.name,
default: {},
}];
const config = { [prop.name]: prop.value };
const result = EnhancedConfigValidator.validateWithMode(
node.nodeType,
config,
properties,
'operation',
'ai-friendly'
);
const timeMs = Date.now() - startTime;
expect(timeMs).toBeLessThan(50);
if (result.valid) {
assignmentPassed++;
}
}
}
}
if (assignmentValidations > 0) {
const passRate = (assignmentPassed / assignmentValidations) * 100;
expect(passRate).toBeGreaterThanOrEqual(95);
}
});
it('should validate resourceLocator type structures from real templates', async () => {
const templates = db.prepare(`
SELECT id, name, workflow_json_compressed, views
FROM templates
WHERE workflow_json_compressed IS NOT NULL
ORDER BY views DESC
LIMIT ?
`).all(SAMPLE_SIZE) as any[];
let locatorValidations = 0;
let locatorPassed = 0;
for (const template of templates) {
const workflow = decompressWorkflow(template.workflow_json_compressed);
const nodes = extractNodesWithSpecialTypes(workflow);
for (const node of nodes) {
for (const prop of node.properties) {
if (prop.type !== 'resourceLocator') continue;
locatorValidations++;
const startTime = Date.now();
const properties = [{
name: prop.name,
type: 'resourceLocator' as NodePropertyTypes,
required: true,
displayName: prop.name,
default: {},
}];
const config = { [prop.name]: prop.value };
const result = EnhancedConfigValidator.validateWithMode(
node.nodeType,
config,
properties,
'operation',
'ai-friendly'
);
const timeMs = Date.now() - startTime;
expect(timeMs).toBeLessThan(50);
if (result.valid) {
locatorPassed++;
}
}
}
}
if (locatorValidations > 0) {
const passRate = (locatorPassed / locatorValidations) * 100;
expect(passRate).toBeGreaterThanOrEqual(95);
}
});
it('should achieve overall >95% pass rate across all special types', async () => {
const templates = db.prepare(`
SELECT id, name, workflow_json_compressed, views
FROM templates
WHERE workflow_json_compressed IS NOT NULL
ORDER BY views DESC
LIMIT ?
`).all(SAMPLE_SIZE) as any[];
let totalValidations = 0;
let totalPassed = 0;
for (const template of templates) {
const workflow = decompressWorkflow(template.workflow_json_compressed);
const nodes = extractNodesWithSpecialTypes(workflow);
for (const node of nodes) {
for (const prop of node.properties) {
totalValidations++;
const properties = [{
name: prop.name,
type: prop.type,
required: true,
displayName: prop.name,
default: {},
}];
const config = { [prop.name]: prop.value };
const result = EnhancedConfigValidator.validateWithMode(
node.nodeType,
config,
properties,
'operation',
'ai-friendly'
);
if (result.valid) {
totalPassed++;
}
}
}
}
if (totalValidations > 0) {
const passRate = (totalPassed / totalValidations) * 100;
expect(passRate).toBeGreaterThanOrEqual(95); // Phase 3 success criteria
}
});
it('should handle Google Sheets credential-provided fields correctly', async () => {
// Find templates with Google Sheets nodes
const templates = db.prepare(`
SELECT id, name, workflow_json_compressed
FROM templates
WHERE workflow_json_compressed IS NOT NULL
AND (
workflow_json_compressed LIKE '%GoogleSheets%'
OR workflow_json_compressed LIKE '%Google Sheets%'
)
LIMIT 10
`).all() as any[];
let sheetIdErrors = 0;
let totalGoogleSheetsNodes = 0;
for (const template of templates) {
const workflow = decompressWorkflow(template.workflow_json_compressed);
if (!workflow?.nodes) continue;
for (const node of workflow.nodes) {
if (node.type !== 'n8n-nodes-base.googleSheets') continue;
totalGoogleSheetsNodes++;
// Create a config that might be missing sheetId (comes from credentials)
const config = { ...node.parameters };
delete config.sheetId; // Simulate missing credential-provided field
const result = EnhancedConfigValidator.validateWithMode(
node.type,
config,
[],
'operation',
'ai-friendly'
);
// Should NOT error about missing sheetId
const hasSheetIdError = result.errors?.some(
e => e.property === 'sheetId' && e.type === 'missing_required'
);
if (hasSheetIdError) {
sheetIdErrors++;
}
}
}
// No sheetId errors should occur (it's credential-provided)
expect(sheetIdErrors).toBe(0);
});
it('should validate all filter operations including exists/notExists/isNotEmpty', async () => {
const templates = db.prepare(`
SELECT id, name, workflow_json_compressed
FROM templates
WHERE workflow_json_compressed IS NOT NULL
ORDER BY views DESC
LIMIT 50
`).all() as any[];
const operationsFound = new Set<string>();
let filterNodes = 0;
for (const template of templates) {
const workflow = decompressWorkflow(template.workflow_json_compressed);
const nodes = extractNodesWithSpecialTypes(workflow);
for (const node of nodes) {
for (const prop of node.properties) {
if (prop.type !== 'filter') continue;
filterNodes++;
// Track operations found in real workflows
if (prop.value?.conditions && Array.isArray(prop.value.conditions)) {
for (const condition of prop.value.conditions) {
if (condition.operator) {
operationsFound.add(condition.operator);
}
}
}
const properties = [{
name: prop.name,
type: 'filter' as NodePropertyTypes,
required: true,
displayName: prop.name,
default: {},
}];
const config = { [prop.name]: prop.value };
const result = EnhancedConfigValidator.validateWithMode(
node.nodeType,
config,
properties,
'operation',
'ai-friendly'
);
// Should not have errors about unsupported operations
const hasUnsupportedOpError = result.errors?.some(
e => e.message?.includes('Unsupported operation')
);
expect(hasUnsupportedOpError).toBe(false);
}
}
}
// Verify we tested some filter nodes
if (filterNodes > 0) {
expect(filterNodes).toBeGreaterThan(0);
}
});
});

View File

@@ -1,366 +0,0 @@
/**
* Tests for Type Structure constants
*
* @group unit
* @group constants
*/
import { describe, it, expect } from 'vitest';
import { TYPE_STRUCTURES, COMPLEX_TYPE_EXAMPLES } from '@/constants/type-structures';
import { isTypeStructure } from '@/types/type-structures';
import type { NodePropertyTypes } from 'n8n-workflow';
describe('TYPE_STRUCTURES', () => {
// All 22 NodePropertyTypes from n8n-workflow
const ALL_PROPERTY_TYPES: NodePropertyTypes[] = [
'boolean',
'button',
'collection',
'color',
'dateTime',
'fixedCollection',
'hidden',
'json',
'callout',
'notice',
'multiOptions',
'number',
'options',
'string',
'credentialsSelect',
'resourceLocator',
'curlImport',
'resourceMapper',
'filter',
'assignmentCollection',
'credentials',
'workflowSelector',
];
describe('Completeness', () => {
it('should define all 22 NodePropertyTypes', () => {
const definedTypes = Object.keys(TYPE_STRUCTURES);
expect(definedTypes).toHaveLength(22);
for (const type of ALL_PROPERTY_TYPES) {
expect(TYPE_STRUCTURES).toHaveProperty(type);
}
});
it('should not have extra types beyond the 22 standard types', () => {
const definedTypes = Object.keys(TYPE_STRUCTURES);
const extraTypes = definedTypes.filter((type) => !ALL_PROPERTY_TYPES.includes(type as NodePropertyTypes));
expect(extraTypes).toHaveLength(0);
});
});
describe('Structure Validity', () => {
it('should have valid TypeStructure for each type', () => {
for (const [typeName, structure] of Object.entries(TYPE_STRUCTURES)) {
expect(isTypeStructure(structure)).toBe(true);
}
});
it('should have required fields for all types', () => {
for (const [typeName, structure] of Object.entries(TYPE_STRUCTURES)) {
expect(structure.type).toBeDefined();
expect(structure.jsType).toBeDefined();
expect(structure.description).toBeDefined();
expect(structure.example).toBeDefined();
expect(typeof structure.type).toBe('string');
expect(typeof structure.jsType).toBe('string');
expect(typeof structure.description).toBe('string');
}
});
it('should have valid type categories', () => {
const validCategories = ['primitive', 'object', 'array', 'collection', 'special'];
for (const [typeName, structure] of Object.entries(TYPE_STRUCTURES)) {
expect(validCategories).toContain(structure.type);
}
});
it('should have valid jsType values', () => {
const validJsTypes = ['string', 'number', 'boolean', 'object', 'array', 'any'];
for (const [typeName, structure] of Object.entries(TYPE_STRUCTURES)) {
expect(validJsTypes).toContain(structure.jsType);
}
});
});
describe('Example Validity', () => {
it('should have non-null examples for all types', () => {
for (const [typeName, structure] of Object.entries(TYPE_STRUCTURES)) {
expect(structure.example).toBeDefined();
}
});
it('should have examples array when provided', () => {
for (const [typeName, structure] of Object.entries(TYPE_STRUCTURES)) {
if (structure.examples) {
expect(Array.isArray(structure.examples)).toBe(true);
expect(structure.examples.length).toBeGreaterThan(0);
}
}
});
it('should have examples matching jsType for primitive types', () => {
const primitiveTypes = ['string', 'number', 'boolean'];
for (const [typeName, structure] of Object.entries(TYPE_STRUCTURES)) {
if (primitiveTypes.includes(structure.jsType)) {
const exampleType = Array.isArray(structure.example)
? 'array'
: typeof structure.example;
if (structure.jsType !== 'any' && exampleType !== 'string') {
// Allow strings for expressions
expect(exampleType).toBe(structure.jsType);
}
}
}
});
it('should have object examples for collection types', () => {
const collectionTypes: NodePropertyTypes[] = ['collection', 'fixedCollection'];
for (const type of collectionTypes) {
const structure = TYPE_STRUCTURES[type];
expect(typeof structure.example).toBe('object');
expect(structure.example).not.toBeNull();
}
});
it('should have array examples for multiOptions', () => {
const structure = TYPE_STRUCTURES.multiOptions;
expect(Array.isArray(structure.example)).toBe(true);
});
});
describe('Specific Type Definitions', () => {
describe('Primitive Types', () => {
it('should define string correctly', () => {
const structure = TYPE_STRUCTURES.string;
expect(structure.type).toBe('primitive');
expect(structure.jsType).toBe('string');
expect(typeof structure.example).toBe('string');
});
it('should define number correctly', () => {
const structure = TYPE_STRUCTURES.number;
expect(structure.type).toBe('primitive');
expect(structure.jsType).toBe('number');
expect(typeof structure.example).toBe('number');
});
it('should define boolean correctly', () => {
const structure = TYPE_STRUCTURES.boolean;
expect(structure.type).toBe('primitive');
expect(structure.jsType).toBe('boolean');
expect(typeof structure.example).toBe('boolean');
});
it('should define dateTime correctly', () => {
const structure = TYPE_STRUCTURES.dateTime;
expect(structure.type).toBe('primitive');
expect(structure.jsType).toBe('string');
expect(structure.validation?.pattern).toBeDefined();
});
it('should define color correctly', () => {
const structure = TYPE_STRUCTURES.color;
expect(structure.type).toBe('primitive');
expect(structure.jsType).toBe('string');
expect(structure.validation?.pattern).toBeDefined();
expect(structure.example).toMatch(/^#[0-9A-Fa-f]{6}$/);
});
it('should define json correctly', () => {
const structure = TYPE_STRUCTURES.json;
expect(structure.type).toBe('primitive');
expect(structure.jsType).toBe('string');
expect(() => JSON.parse(structure.example)).not.toThrow();
});
});
describe('Complex Types', () => {
it('should define collection with structure', () => {
const structure = TYPE_STRUCTURES.collection;
expect(structure.type).toBe('collection');
expect(structure.jsType).toBe('object');
expect(structure.structure).toBeDefined();
});
it('should define fixedCollection with structure', () => {
const structure = TYPE_STRUCTURES.fixedCollection;
expect(structure.type).toBe('collection');
expect(structure.jsType).toBe('object');
expect(structure.structure).toBeDefined();
});
it('should define resourceLocator with mode and value', () => {
const structure = TYPE_STRUCTURES.resourceLocator;
expect(structure.type).toBe('special');
expect(structure.structure?.properties?.mode).toBeDefined();
expect(structure.structure?.properties?.value).toBeDefined();
expect(structure.example).toHaveProperty('mode');
expect(structure.example).toHaveProperty('value');
});
it('should define resourceMapper with mappingMode', () => {
const structure = TYPE_STRUCTURES.resourceMapper;
expect(structure.type).toBe('special');
expect(structure.structure?.properties?.mappingMode).toBeDefined();
expect(structure.example).toHaveProperty('mappingMode');
});
it('should define filter with conditions and combinator', () => {
const structure = TYPE_STRUCTURES.filter;
expect(structure.type).toBe('special');
expect(structure.structure?.properties?.conditions).toBeDefined();
expect(structure.structure?.properties?.combinator).toBeDefined();
expect(structure.example).toHaveProperty('conditions');
expect(structure.example).toHaveProperty('combinator');
});
it('should define assignmentCollection with assignments', () => {
const structure = TYPE_STRUCTURES.assignmentCollection;
expect(structure.type).toBe('special');
expect(structure.structure?.properties?.assignments).toBeDefined();
expect(structure.example).toHaveProperty('assignments');
});
});
describe('UI Types', () => {
it('should define hidden as special type', () => {
const structure = TYPE_STRUCTURES.hidden;
expect(structure.type).toBe('special');
});
it('should define button as special type', () => {
const structure = TYPE_STRUCTURES.button;
expect(structure.type).toBe('special');
});
it('should define callout as special type', () => {
const structure = TYPE_STRUCTURES.callout;
expect(structure.type).toBe('special');
});
it('should define notice as special type', () => {
const structure = TYPE_STRUCTURES.notice;
expect(structure.type).toBe('special');
});
});
});
describe('Validation Rules', () => {
it('should have validation rules for types that need them', () => {
const typesWithValidation = [
'string',
'number',
'boolean',
'dateTime',
'color',
'json',
];
for (const type of typesWithValidation) {
const structure = TYPE_STRUCTURES[type as NodePropertyTypes];
expect(structure.validation).toBeDefined();
}
});
it('should specify allowExpressions correctly', () => {
// Types that allow expressions
const allowExpressionsTypes = ['string', 'dateTime', 'color', 'json'];
for (const type of allowExpressionsTypes) {
const structure = TYPE_STRUCTURES[type as NodePropertyTypes];
expect(structure.validation?.allowExpressions).toBe(true);
}
// Types that don't allow expressions
expect(TYPE_STRUCTURES.boolean.validation?.allowExpressions).toBe(false);
});
it('should have patterns for format-sensitive types', () => {
expect(TYPE_STRUCTURES.dateTime.validation?.pattern).toBeDefined();
expect(TYPE_STRUCTURES.color.validation?.pattern).toBeDefined();
});
});
describe('Documentation Quality', () => {
it('should have descriptions for all types', () => {
for (const [typeName, structure] of Object.entries(TYPE_STRUCTURES)) {
expect(structure.description).toBeDefined();
expect(structure.description.length).toBeGreaterThan(10);
}
});
it('should have notes for complex types', () => {
const complexTypes = ['collection', 'fixedCollection', 'filter', 'resourceMapper'];
for (const type of complexTypes) {
const structure = TYPE_STRUCTURES[type as NodePropertyTypes];
expect(structure.notes).toBeDefined();
expect(structure.notes!.length).toBeGreaterThan(0);
}
});
});
});
describe('COMPLEX_TYPE_EXAMPLES', () => {
it('should have examples for all complex types', () => {
const complexTypes = ['collection', 'fixedCollection', 'filter', 'resourceMapper', 'assignmentCollection'];
for (const type of complexTypes) {
expect(COMPLEX_TYPE_EXAMPLES).toHaveProperty(type);
expect(COMPLEX_TYPE_EXAMPLES[type as keyof typeof COMPLEX_TYPE_EXAMPLES]).toBeDefined();
}
});
it('should have multiple example scenarios for each type', () => {
for (const [type, examples] of Object.entries(COMPLEX_TYPE_EXAMPLES)) {
expect(Object.keys(examples).length).toBeGreaterThan(0);
}
});
it('should have valid collection examples', () => {
const examples = COMPLEX_TYPE_EXAMPLES.collection;
expect(examples.basic).toBeDefined();
expect(typeof examples.basic).toBe('object');
});
it('should have valid fixedCollection examples', () => {
const examples = COMPLEX_TYPE_EXAMPLES.fixedCollection;
expect(examples.httpHeaders).toBeDefined();
expect(examples.httpHeaders.headers).toBeDefined();
expect(Array.isArray(examples.httpHeaders.headers)).toBe(true);
});
it('should have valid filter examples', () => {
const examples = COMPLEX_TYPE_EXAMPLES.filter;
expect(examples.simple).toBeDefined();
expect(examples.simple.conditions).toBeDefined();
expect(examples.simple.combinator).toBeDefined();
});
it('should have valid resourceMapper examples', () => {
const examples = COMPLEX_TYPE_EXAMPLES.resourceMapper;
expect(examples.autoMap).toBeDefined();
expect(examples.manual).toBeDefined();
expect(examples.manual.mappingMode).toBe('defineBelow');
});
it('should have valid assignmentCollection examples', () => {
const examples = COMPLEX_TYPE_EXAMPLES.assignmentCollection;
expect(examples.basic).toBeDefined();
expect(examples.basic.assignments).toBeDefined();
expect(Array.isArray(examples.basic.assignments)).toBe(true);
});
});

View File

@@ -411,17 +411,17 @@ describe('HTTP Server Session Management', () => {
it('should handle removeSession with transport close error gracefully', async () => {
server = new SingleSessionHTTPServer();
const mockTransport = {
const mockTransport = {
close: vi.fn().mockRejectedValue(new Error('Transport close failed'))
};
(server as any).transports = { 'test-session': mockTransport };
(server as any).servers = { 'test-session': {} };
(server as any).sessionMetadata = {
'test-session': {
(server as any).sessionMetadata = {
'test-session': {
lastAccess: new Date(),
createdAt: new Date()
}
}
};
// Should not throw even if transport close fails
@@ -429,67 +429,11 @@ describe('HTTP Server Session Management', () => {
// Verify transport close was attempted
expect(mockTransport.close).toHaveBeenCalled();
// Session should still be cleaned up despite transport error
// Note: The actual implementation may handle errors differently, so let's verify what we can
expect(mockTransport.close).toHaveBeenCalledWith();
});
it('should not cause infinite recursion when transport.close triggers onclose handler', async () => {
server = new SingleSessionHTTPServer();
const sessionId = 'test-recursion-session';
let closeCallCount = 0;
let oncloseCallCount = 0;
// Create a mock transport that simulates the actual behavior
const mockTransport = {
close: vi.fn().mockImplementation(async () => {
closeCallCount++;
// Simulate the actual SDK behavior: close() triggers onclose handler
if (mockTransport.onclose) {
oncloseCallCount++;
await mockTransport.onclose();
}
}),
onclose: null as (() => Promise<void>) | null,
sessionId
};
// Set up the transport and session data
(server as any).transports = { [sessionId]: mockTransport };
(server as any).servers = { [sessionId]: {} };
(server as any).sessionMetadata = {
[sessionId]: {
lastAccess: new Date(),
createdAt: new Date()
}
};
// Set up onclose handler like the real implementation does
// This handler calls removeSession, which could cause infinite recursion
mockTransport.onclose = async () => {
await (server as any).removeSession(sessionId, 'transport_closed');
};
// Call removeSession - this should NOT cause infinite recursion
await (server as any).removeSession(sessionId, 'manual_removal');
// Verify the fix works:
// 1. close() should be called exactly once
expect(closeCallCount).toBe(1);
// 2. onclose handler should be triggered
expect(oncloseCallCount).toBe(1);
// 3. Transport should be deleted and not cause second close attempt
expect((server as any).transports[sessionId]).toBeUndefined();
expect((server as any).servers[sessionId]).toBeUndefined();
expect((server as any).sessionMetadata[sessionId]).toBeUndefined();
// 4. If there was a recursion bug, closeCallCount would be > 1
// or the test would timeout/crash with "Maximum call stack size exceeded"
});
});
describe('Session Metadata Tracking', () => {

View File

@@ -1,431 +0,0 @@
import { describe, it, expect, beforeEach, afterEach, vi } from 'vitest';
import { N8NDocumentationMCPServer } from '../../../src/mcp/server';
// Mock the database and dependencies
vi.mock('../../../src/database/database-adapter');
vi.mock('../../../src/database/node-repository');
vi.mock('../../../src/templates/template-service');
vi.mock('../../../src/utils/logger');
/**
* Test wrapper class that exposes private methods for unit testing.
* This pattern is preferred over modifying production code visibility
* or using reflection-based testing utilities.
*/
class TestableN8NMCPServer extends N8NDocumentationMCPServer {
/**
* Expose getDisabledTools() for testing environment variable parsing.
* @returns Set of disabled tool names from DISABLED_TOOLS env var
*/
public testGetDisabledTools(): Set<string> {
return (this as any).getDisabledTools();
}
/**
* Expose executeTool() for testing the defense-in-depth guard.
* @param name - Tool name to execute
* @param args - Tool arguments
* @returns Tool execution result
*/
public async testExecuteTool(name: string, args: any): Promise<any> {
return (this as any).executeTool(name, args);
}
}
describe('Disabled Tools Additional Coverage (Issue #410)', () => {
let server: TestableN8NMCPServer;
beforeEach(() => {
// Set environment variable to use in-memory database
process.env.NODE_DB_PATH = ':memory:';
});
afterEach(() => {
delete process.env.NODE_DB_PATH;
delete process.env.DISABLED_TOOLS;
delete process.env.ENABLE_MULTI_TENANT;
delete process.env.N8N_API_URL;
delete process.env.N8N_API_KEY;
});
describe('Error Response Structure Validation', () => {
it('should throw error with specific message format', async () => {
process.env.DISABLED_TOOLS = 'test_tool';
server = new TestableN8NMCPServer();
let thrownError: Error | null = null;
try {
await server.testExecuteTool('test_tool', {});
} catch (error) {
thrownError = error as Error;
}
// Verify error was thrown
expect(thrownError).not.toBeNull();
expect(thrownError?.message).toBe(
"Tool 'test_tool' is disabled via DISABLED_TOOLS environment variable"
);
});
it('should include tool name in error message', async () => {
const toolName = 'my_special_tool';
process.env.DISABLED_TOOLS = toolName;
server = new TestableN8NMCPServer();
let errorMessage = '';
try {
await server.testExecuteTool(toolName, {});
} catch (error: any) {
errorMessage = error.message;
}
expect(errorMessage).toContain(toolName);
expect(errorMessage).toContain('disabled via DISABLED_TOOLS');
});
it('should throw consistent error format for all disabled tools', async () => {
const tools = ['tool1', 'tool2', 'tool3'];
process.env.DISABLED_TOOLS = tools.join(',');
server = new TestableN8NMCPServer();
for (const tool of tools) {
let errorMessage = '';
try {
await server.testExecuteTool(tool, {});
} catch (error: any) {
errorMessage = error.message;
}
// Verify consistent error format
expect(errorMessage).toMatch(/^Tool '.*' is disabled via DISABLED_TOOLS environment variable$/);
expect(errorMessage).toContain(tool);
}
});
});
describe('Multi-Tenant Mode Interaction', () => {
it('should respect DISABLED_TOOLS in multi-tenant mode', () => {
process.env.ENABLE_MULTI_TENANT = 'true';
process.env.DISABLED_TOOLS = 'n8n_delete_workflow,n8n_update_full_workflow';
delete process.env.N8N_API_URL;
delete process.env.N8N_API_KEY;
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
// Even in multi-tenant mode, disabled tools should be filtered
expect(disabledTools.has('n8n_delete_workflow')).toBe(true);
expect(disabledTools.has('n8n_update_full_workflow')).toBe(true);
expect(disabledTools.size).toBe(2);
});
it('should parse DISABLED_TOOLS regardless of N8N_API_URL setting', () => {
process.env.DISABLED_TOOLS = 'tool1,tool2';
process.env.N8N_API_URL = 'http://localhost:5678';
process.env.N8N_API_KEY = 'test-key';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.size).toBe(2);
expect(disabledTools.has('tool1')).toBe(true);
expect(disabledTools.has('tool2')).toBe(true);
});
it('should work when only ENABLE_MULTI_TENANT is set', () => {
process.env.ENABLE_MULTI_TENANT = 'true';
process.env.DISABLED_TOOLS = 'restricted_tool';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.has('restricted_tool')).toBe(true);
});
});
describe('Edge Cases - Special Characters and Unicode', () => {
it('should handle unicode tool names correctly', () => {
process.env.DISABLED_TOOLS = 'tool_测试,tool_münchen,tool_العربية';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.size).toBe(3);
expect(disabledTools.has('tool_测试')).toBe(true);
expect(disabledTools.has('tool_münchen')).toBe(true);
expect(disabledTools.has('tool_العربية')).toBe(true);
});
it('should handle emoji in tool names', () => {
process.env.DISABLED_TOOLS = 'tool_🎯,tool_✅,tool_❌';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.size).toBe(3);
expect(disabledTools.has('tool_🎯')).toBe(true);
expect(disabledTools.has('tool_✅')).toBe(true);
expect(disabledTools.has('tool_❌')).toBe(true);
});
it('should treat regex special characters as literals', () => {
process.env.DISABLED_TOOLS = 'tool.*,tool[0-9],tool(test)';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
// These should be treated as literal strings, not regex patterns
expect(disabledTools.has('tool.*')).toBe(true);
expect(disabledTools.has('tool[0-9]')).toBe(true);
expect(disabledTools.has('tool(test)')).toBe(true);
expect(disabledTools.size).toBe(3);
});
it('should handle tool names with dots and colons', () => {
process.env.DISABLED_TOOLS = 'org.example.tool,namespace:tool:v1';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.has('org.example.tool')).toBe(true);
expect(disabledTools.has('namespace:tool:v1')).toBe(true);
});
it('should handle tool names with @ symbols', () => {
process.env.DISABLED_TOOLS = '@scope/tool,user@tool';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.has('@scope/tool')).toBe(true);
expect(disabledTools.has('user@tool')).toBe(true);
});
});
describe('Performance and Scale', () => {
it('should handle 100 disabled tools efficiently', () => {
const manyTools = Array.from({ length: 100 }, (_, i) => `tool_${i}`);
process.env.DISABLED_TOOLS = manyTools.join(',');
const start = Date.now();
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
const duration = Date.now() - start;
expect(disabledTools.size).toBe(100);
expect(duration).toBeLessThan(50); // Should be very fast
});
it('should handle 1000 disabled tools efficiently and enforce 200 tool limit', () => {
const manyTools = Array.from({ length: 1000 }, (_, i) => `tool_${i}`);
process.env.DISABLED_TOOLS = manyTools.join(',');
const start = Date.now();
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
const duration = Date.now() - start;
// Safety limit: max 200 tools enforced
expect(disabledTools.size).toBe(200);
expect(duration).toBeLessThan(100); // Should still be fast
});
it('should efficiently check membership in large disabled set', () => {
const manyTools = Array.from({ length: 500 }, (_, i) => `tool_${i}`);
process.env.DISABLED_TOOLS = manyTools.join(',');
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
// Test membership check performance (Set.has() is O(1))
const start = Date.now();
for (let i = 0; i < 1000; i++) {
disabledTools.has(`tool_${i % 500}`);
}
const duration = Date.now() - start;
expect(duration).toBeLessThan(10); // Should be very fast
});
});
describe('Environment Variable Edge Cases', () => {
it('should handle very long tool names', () => {
const longToolName = 'tool_' + 'a'.repeat(500);
process.env.DISABLED_TOOLS = longToolName;
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.has(longToolName)).toBe(true);
});
it('should handle newlines in tool names (after trim)', () => {
process.env.DISABLED_TOOLS = 'tool1\n,tool2\r\n,tool3\r';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
// Newlines should be trimmed
expect(disabledTools.has('tool1')).toBe(true);
expect(disabledTools.has('tool2')).toBe(true);
expect(disabledTools.has('tool3')).toBe(true);
});
it('should handle tabs in tool names (after trim)', () => {
process.env.DISABLED_TOOLS = '\ttool1\t,\ttool2\t';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.has('tool1')).toBe(true);
expect(disabledTools.has('tool2')).toBe(true);
});
it('should handle mixed whitespace correctly', () => {
process.env.DISABLED_TOOLS = ' \t tool1 \n , tool2 \r\n, tool3 ';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.size).toBe(3);
expect(disabledTools.has('tool1')).toBe(true);
expect(disabledTools.has('tool2')).toBe(true);
expect(disabledTools.has('tool3')).toBe(true);
});
it('should enforce 10KB limit on DISABLED_TOOLS environment variable', () => {
// Create a very long env var (15KB) by repeating tool names
const longTools = Array.from({ length: 1500 }, (_, i) => `tool_${i}`);
const longValue = longTools.join(',');
// Verify we created >10KB string
expect(longValue.length).toBeGreaterThan(10000);
process.env.DISABLED_TOOLS = longValue;
server = new TestableN8NMCPServer();
// Should succeed and truncate to 10KB
const disabledTools = server.testGetDisabledTools();
// Should have parsed some tools (at least the first ones)
expect(disabledTools.size).toBeGreaterThan(0);
// First few tools should be present (they're in the first 10KB)
expect(disabledTools.has('tool_0')).toBe(true);
expect(disabledTools.has('tool_1')).toBe(true);
expect(disabledTools.has('tool_2')).toBe(true);
// Last tools should NOT be present (they were truncated)
expect(disabledTools.has('tool_1499')).toBe(false);
expect(disabledTools.has('tool_1498')).toBe(false);
});
});
describe('Defense in Depth - Multiple Layers', () => {
it('should prevent execution at executeTool level', async () => {
process.env.DISABLED_TOOLS = 'blocked_tool';
server = new TestableN8NMCPServer();
// The executeTool method should throw immediately
await expect(async () => {
await server.testExecuteTool('blocked_tool', {});
}).rejects.toThrow('disabled via DISABLED_TOOLS');
});
it('should be case-sensitive in tool name matching', async () => {
process.env.DISABLED_TOOLS = 'BlockedTool';
server = new TestableN8NMCPServer();
// 'blockedtool' should NOT be blocked (case-sensitive)
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.has('BlockedTool')).toBe(true);
expect(disabledTools.has('blockedtool')).toBe(false);
});
it('should check disabled status on every executeTool call', async () => {
process.env.DISABLED_TOOLS = 'tool1';
server = new TestableN8NMCPServer();
// First call should fail
await expect(async () => {
await server.testExecuteTool('tool1', {});
}).rejects.toThrow('disabled');
// Second call should also fail (consistent behavior)
await expect(async () => {
await server.testExecuteTool('tool1', {});
}).rejects.toThrow('disabled');
// Non-disabled tool should work (or fail for other reasons)
try {
await server.testExecuteTool('other_tool', {});
} catch (error: any) {
// Should not be disabled error
expect(error.message).not.toContain('disabled via DISABLED_TOOLS');
}
});
it('should not leak list of disabled tools in error response', async () => {
// Set multiple disabled tools including some "secret" ones
process.env.DISABLED_TOOLS = 'secret_tool_1,secret_tool_2,secret_tool_3,attempted_tool';
server = new TestableN8NMCPServer();
// Try to execute one of the disabled tools
let errorMessage = '';
try {
await server.testExecuteTool('attempted_tool', {});
} catch (error: any) {
errorMessage = error.message;
}
// Error message should mention the attempted tool
expect(errorMessage).toContain('attempted_tool');
expect(errorMessage).toContain('disabled via DISABLED_TOOLS');
// Error message should NOT leak the other disabled tools
expect(errorMessage).not.toContain('secret_tool_1');
expect(errorMessage).not.toContain('secret_tool_2');
expect(errorMessage).not.toContain('secret_tool_3');
// Should not contain any arrays or lists
expect(errorMessage).not.toContain('[');
expect(errorMessage).not.toContain(']');
});
});
describe('Real-World Deployment Verification', () => {
it('should support common security hardening scenario', () => {
// Disable all write/delete operations in production
const dangerousTools = [
'n8n_delete_workflow',
'n8n_update_full_workflow',
'n8n_delete_execution',
];
process.env.DISABLED_TOOLS = dangerousTools.join(',');
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
dangerousTools.forEach(tool => {
expect(disabledTools.has(tool)).toBe(true);
});
});
it('should support staging environment scenario', () => {
// In staging, disable only production-specific tools
process.env.DISABLED_TOOLS = 'n8n_trigger_webhook_workflow';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.has('n8n_trigger_webhook_workflow')).toBe(true);
expect(disabledTools.size).toBe(1);
});
it('should support development environment scenario', () => {
// In dev, maybe disable resource-intensive tools
process.env.DISABLED_TOOLS = 'search_templates_by_metadata,fetch_large_datasets';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.size).toBe(2);
});
});
});

View File

@@ -1,311 +0,0 @@
import { describe, it, expect, beforeEach, afterEach, vi } from 'vitest';
import { N8NDocumentationMCPServer } from '../../../src/mcp/server';
import { n8nDocumentationToolsFinal } from '../../../src/mcp/tools';
import { n8nManagementTools } from '../../../src/mcp/tools-n8n-manager';
// Mock the database and dependencies
vi.mock('../../../src/database/database-adapter');
vi.mock('../../../src/database/node-repository');
vi.mock('../../../src/templates/template-service');
vi.mock('../../../src/utils/logger');
/**
* Test wrapper class that exposes private methods for unit testing.
* This pattern is preferred over modifying production code visibility
* or using reflection-based testing utilities.
*/
class TestableN8NMCPServer extends N8NDocumentationMCPServer {
/**
* Expose getDisabledTools() for testing environment variable parsing.
* @returns Set of disabled tool names from DISABLED_TOOLS env var
*/
public testGetDisabledTools(): Set<string> {
return (this as any).getDisabledTools();
}
/**
* Expose executeTool() for testing the defense-in-depth guard.
* @param name - Tool name to execute
* @param args - Tool arguments
* @returns Tool execution result
*/
public async testExecuteTool(name: string, args: any): Promise<any> {
return (this as any).executeTool(name, args);
}
}
describe('Disabled Tools Feature (Issue #410)', () => {
let server: TestableN8NMCPServer;
beforeEach(() => {
// Set environment variable to use in-memory database
process.env.NODE_DB_PATH = ':memory:';
});
afterEach(() => {
delete process.env.NODE_DB_PATH;
delete process.env.DISABLED_TOOLS;
});
describe('getDisabledTools() - Environment Variable Parsing', () => {
it('should return empty set when DISABLED_TOOLS is not set', () => {
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.size).toBe(0);
});
it('should return empty set when DISABLED_TOOLS is empty string', () => {
process.env.DISABLED_TOOLS = '';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.size).toBe(0);
});
it('should parse single disabled tool correctly', () => {
process.env.DISABLED_TOOLS = 'n8n_diagnostic';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.size).toBe(1);
expect(disabledTools.has('n8n_diagnostic')).toBe(true);
});
it('should parse multiple disabled tools correctly', () => {
process.env.DISABLED_TOOLS = 'n8n_diagnostic,n8n_health_check,list_nodes';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.size).toBe(3);
expect(disabledTools.has('n8n_diagnostic')).toBe(true);
expect(disabledTools.has('n8n_health_check')).toBe(true);
expect(disabledTools.has('list_nodes')).toBe(true);
});
it('should trim whitespace from tool names', () => {
process.env.DISABLED_TOOLS = ' n8n_diagnostic , n8n_health_check ';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.size).toBe(2);
expect(disabledTools.has('n8n_diagnostic')).toBe(true);
expect(disabledTools.has('n8n_health_check')).toBe(true);
});
it('should filter out empty entries from comma-separated list', () => {
process.env.DISABLED_TOOLS = 'n8n_diagnostic,,n8n_health_check,,,list_nodes';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.size).toBe(3);
expect(disabledTools.has('n8n_diagnostic')).toBe(true);
expect(disabledTools.has('n8n_health_check')).toBe(true);
expect(disabledTools.has('list_nodes')).toBe(true);
});
it('should handle single comma correctly', () => {
process.env.DISABLED_TOOLS = ',';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.size).toBe(0);
});
it('should handle multiple commas without values', () => {
process.env.DISABLED_TOOLS = ',,,';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.size).toBe(0);
});
});
describe('executeTool() - Disabled Tool Guard', () => {
it('should throw error when calling disabled tool', async () => {
process.env.DISABLED_TOOLS = 'tools_documentation';
server = new TestableN8NMCPServer();
await expect(async () => {
await server.testExecuteTool('tools_documentation', {});
}).rejects.toThrow("Tool 'tools_documentation' is disabled via DISABLED_TOOLS environment variable");
});
it('should allow calling enabled tool when others are disabled', async () => {
process.env.DISABLED_TOOLS = 'n8n_diagnostic,n8n_health_check';
server = new TestableN8NMCPServer();
// This should not throw - tools_documentation is not disabled
// The tool execution may fail for other reasons (like missing data),
// but it should NOT fail due to being disabled
try {
await server.testExecuteTool('tools_documentation', {});
} catch (error: any) {
// Ensure the error is NOT about the tool being disabled
expect(error.message).not.toContain('disabled via DISABLED_TOOLS');
}
});
it('should throw error for all disabled tools in list', async () => {
process.env.DISABLED_TOOLS = 'tool1,tool2,tool3';
server = new TestableN8NMCPServer();
for (const toolName of ['tool1', 'tool2', 'tool3']) {
await expect(async () => {
await server.testExecuteTool(toolName, {});
}).rejects.toThrow(`Tool '${toolName}' is disabled via DISABLED_TOOLS environment variable`);
}
});
});
describe('Tool Filtering - Documentation Tools', () => {
it('should filter disabled documentation tools from list', () => {
// Find a documentation tool to disable
const docTool = n8nDocumentationToolsFinal[0];
if (!docTool) {
throw new Error('No documentation tools available for testing');
}
process.env.DISABLED_TOOLS = docTool.name;
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.has(docTool.name)).toBe(true);
expect(disabledTools.size).toBe(1);
});
it('should filter multiple disabled documentation tools', () => {
const tool1 = n8nDocumentationToolsFinal[0];
const tool2 = n8nDocumentationToolsFinal[1];
if (!tool1 || !tool2) {
throw new Error('Not enough documentation tools available for testing');
}
process.env.DISABLED_TOOLS = `${tool1.name},${tool2.name}`;
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.has(tool1.name)).toBe(true);
expect(disabledTools.has(tool2.name)).toBe(true);
expect(disabledTools.size).toBe(2);
});
});
describe('Tool Filtering - Management Tools', () => {
it('should filter disabled management tools from list', () => {
// Find a management tool to disable
const mgmtTool = n8nManagementTools[0];
if (!mgmtTool) {
throw new Error('No management tools available for testing');
}
process.env.DISABLED_TOOLS = mgmtTool.name;
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.has(mgmtTool.name)).toBe(true);
expect(disabledTools.size).toBe(1);
});
it('should filter multiple disabled management tools', () => {
const tool1 = n8nManagementTools[0];
const tool2 = n8nManagementTools[1];
if (!tool1 || !tool2) {
throw new Error('Not enough management tools available for testing');
}
process.env.DISABLED_TOOLS = `${tool1.name},${tool2.name}`;
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.has(tool1.name)).toBe(true);
expect(disabledTools.has(tool2.name)).toBe(true);
expect(disabledTools.size).toBe(2);
});
});
describe('Tool Filtering - Mixed Tools', () => {
it('should filter disabled tools from both documentation and management lists', () => {
const docTool = n8nDocumentationToolsFinal[0];
const mgmtTool = n8nManagementTools[0];
if (!docTool || !mgmtTool) {
throw new Error('Tools not available for testing');
}
process.env.DISABLED_TOOLS = `${docTool.name},${mgmtTool.name}`;
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.has(docTool.name)).toBe(true);
expect(disabledTools.has(mgmtTool.name)).toBe(true);
expect(disabledTools.size).toBe(2);
});
});
describe('Invalid Tool Names', () => {
it('should gracefully handle non-existent tool names', () => {
process.env.DISABLED_TOOLS = 'non_existent_tool,another_fake_tool';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
// Should still parse and store them, even if they don't exist
expect(disabledTools.size).toBe(2);
expect(disabledTools.has('non_existent_tool')).toBe(true);
expect(disabledTools.has('another_fake_tool')).toBe(true);
});
it('should handle special characters in tool names', () => {
process.env.DISABLED_TOOLS = 'tool-with-dashes,tool_with_underscores,tool.with.dots';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.size).toBe(3);
expect(disabledTools.has('tool-with-dashes')).toBe(true);
expect(disabledTools.has('tool_with_underscores')).toBe(true);
expect(disabledTools.has('tool.with.dots')).toBe(true);
});
});
describe('Real-World Use Cases', () => {
it('should support multi-tenant deployment use case - disable diagnostic tools', () => {
process.env.DISABLED_TOOLS = 'n8n_diagnostic,n8n_health_check';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.has('n8n_diagnostic')).toBe(true);
expect(disabledTools.has('n8n_health_check')).toBe(true);
expect(disabledTools.size).toBe(2);
});
it('should support security hardening use case - disable management tools', () => {
// Disable potentially dangerous management tools
const dangerousTools = [
'n8n_delete_workflow',
'n8n_update_full_workflow'
];
process.env.DISABLED_TOOLS = dangerousTools.join(',');
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
dangerousTools.forEach(tool => {
expect(disabledTools.has(tool)).toBe(true);
});
expect(disabledTools.size).toBe(dangerousTools.length);
});
it('should support feature flag use case - disable experimental tools', () => {
// Example: Disable experimental or beta features
process.env.DISABLED_TOOLS = 'experimental_tool_1,beta_feature';
server = new TestableN8NMCPServer();
const disabledTools = server.testGetDisabledTools();
expect(disabledTools.has('experimental_tool_1')).toBe(true);
expect(disabledTools.has('beta_feature')).toBe(true);
expect(disabledTools.size).toBe(2);
});
});
});

View File

@@ -156,11 +156,9 @@ describe('handlers-workflow-diff', () => {
operationsApplied: 1,
workflowId: 'test-workflow-id',
workflowName: 'Test Workflow',
active: true,
applied: [0],
failed: [],
errors: [],
warnings: undefined,
},
});
@@ -635,211 +633,5 @@ describe('handlers-workflow-diff', () => {
},
});
});
describe('Workflow Activation/Deactivation', () => {
it('should activate workflow after successful update', async () => {
const testWorkflow = createTestWorkflow({ active: false });
const updatedWorkflow = { ...testWorkflow, active: false };
const activatedWorkflow = { ...testWorkflow, active: true };
mockApiClient.getWorkflow.mockResolvedValue(testWorkflow);
mockDiffEngine.applyDiff.mockResolvedValue({
success: true,
workflow: updatedWorkflow,
operationsApplied: 1,
message: 'Success',
errors: [],
shouldActivate: true,
});
mockApiClient.updateWorkflow.mockResolvedValue(updatedWorkflow);
mockApiClient.activateWorkflow = vi.fn().mockResolvedValue(activatedWorkflow);
const result = await handleUpdatePartialWorkflow({
id: 'test-workflow-id',
operations: [{ type: 'activateWorkflow' }],
}, mockRepository);
expect(result.success).toBe(true);
expect(result.data).toEqual(activatedWorkflow);
expect(result.message).toContain('Workflow activated');
expect(result.details?.active).toBe(true);
expect(mockApiClient.activateWorkflow).toHaveBeenCalledWith('test-workflow-id');
});
it('should deactivate workflow after successful update', async () => {
const testWorkflow = createTestWorkflow({ active: true });
const updatedWorkflow = { ...testWorkflow, active: true };
const deactivatedWorkflow = { ...testWorkflow, active: false };
mockApiClient.getWorkflow.mockResolvedValue(testWorkflow);
mockDiffEngine.applyDiff.mockResolvedValue({
success: true,
workflow: updatedWorkflow,
operationsApplied: 1,
message: 'Success',
errors: [],
shouldDeactivate: true,
});
mockApiClient.updateWorkflow.mockResolvedValue(updatedWorkflow);
mockApiClient.deactivateWorkflow = vi.fn().mockResolvedValue(deactivatedWorkflow);
const result = await handleUpdatePartialWorkflow({
id: 'test-workflow-id',
operations: [{ type: 'deactivateWorkflow' }],
}, mockRepository);
expect(result.success).toBe(true);
expect(result.data).toEqual(deactivatedWorkflow);
expect(result.message).toContain('Workflow deactivated');
expect(result.details?.active).toBe(false);
expect(mockApiClient.deactivateWorkflow).toHaveBeenCalledWith('test-workflow-id');
});
it('should handle activation failure after successful update', async () => {
const testWorkflow = createTestWorkflow({ active: false });
const updatedWorkflow = { ...testWorkflow, active: false };
mockApiClient.getWorkflow.mockResolvedValue(testWorkflow);
mockDiffEngine.applyDiff.mockResolvedValue({
success: true,
workflow: updatedWorkflow,
operationsApplied: 1,
message: 'Success',
errors: [],
shouldActivate: true,
});
mockApiClient.updateWorkflow.mockResolvedValue(updatedWorkflow);
mockApiClient.activateWorkflow = vi.fn().mockRejectedValue(new Error('Activation failed: No trigger nodes'));
const result = await handleUpdatePartialWorkflow({
id: 'test-workflow-id',
operations: [{ type: 'activateWorkflow' }],
}, mockRepository);
expect(result.success).toBe(false);
expect(result.error).toBe('Workflow updated successfully but activation failed');
expect(result.details).toEqual({
workflowUpdated: true,
activationError: 'Activation failed: No trigger nodes',
});
});
it('should handle deactivation failure after successful update', async () => {
const testWorkflow = createTestWorkflow({ active: true });
const updatedWorkflow = { ...testWorkflow, active: true };
mockApiClient.getWorkflow.mockResolvedValue(testWorkflow);
mockDiffEngine.applyDiff.mockResolvedValue({
success: true,
workflow: updatedWorkflow,
operationsApplied: 1,
message: 'Success',
errors: [],
shouldDeactivate: true,
});
mockApiClient.updateWorkflow.mockResolvedValue(updatedWorkflow);
mockApiClient.deactivateWorkflow = vi.fn().mockRejectedValue(new Error('Deactivation failed'));
const result = await handleUpdatePartialWorkflow({
id: 'test-workflow-id',
operations: [{ type: 'deactivateWorkflow' }],
}, mockRepository);
expect(result.success).toBe(false);
expect(result.error).toBe('Workflow updated successfully but deactivation failed');
expect(result.details).toEqual({
workflowUpdated: true,
deactivationError: 'Deactivation failed',
});
});
it('should update workflow without activation when shouldActivate is false', async () => {
const testWorkflow = createTestWorkflow({ active: false });
const updatedWorkflow = { ...testWorkflow, active: false };
mockApiClient.getWorkflow.mockResolvedValue(testWorkflow);
mockDiffEngine.applyDiff.mockResolvedValue({
success: true,
workflow: updatedWorkflow,
operationsApplied: 1,
message: 'Success',
errors: [],
shouldActivate: false,
shouldDeactivate: false,
});
mockApiClient.updateWorkflow.mockResolvedValue(updatedWorkflow);
mockApiClient.activateWorkflow = vi.fn();
mockApiClient.deactivateWorkflow = vi.fn();
const result = await handleUpdatePartialWorkflow({
id: 'test-workflow-id',
operations: [{ type: 'updateName', name: 'Updated' }],
}, mockRepository);
expect(result.success).toBe(true);
expect(result.message).not.toContain('activated');
expect(result.message).not.toContain('deactivated');
expect(mockApiClient.activateWorkflow).not.toHaveBeenCalled();
expect(mockApiClient.deactivateWorkflow).not.toHaveBeenCalled();
});
it('should handle non-Error activation failures', async () => {
const testWorkflow = createTestWorkflow({ active: false });
const updatedWorkflow = { ...testWorkflow, active: false };
mockApiClient.getWorkflow.mockResolvedValue(testWorkflow);
mockDiffEngine.applyDiff.mockResolvedValue({
success: true,
workflow: updatedWorkflow,
operationsApplied: 1,
message: 'Success',
errors: [],
shouldActivate: true,
});
mockApiClient.updateWorkflow.mockResolvedValue(updatedWorkflow);
mockApiClient.activateWorkflow = vi.fn().mockRejectedValue('String error');
const result = await handleUpdatePartialWorkflow({
id: 'test-workflow-id',
operations: [{ type: 'activateWorkflow' }],
}, mockRepository);
expect(result.success).toBe(false);
expect(result.error).toBe('Workflow updated successfully but activation failed');
expect(result.details).toEqual({
workflowUpdated: true,
activationError: 'Unknown error',
});
});
it('should handle non-Error deactivation failures', async () => {
const testWorkflow = createTestWorkflow({ active: true });
const updatedWorkflow = { ...testWorkflow, active: true };
mockApiClient.getWorkflow.mockResolvedValue(testWorkflow);
mockDiffEngine.applyDiff.mockResolvedValue({
success: true,
workflow: updatedWorkflow,
operationsApplied: 1,
message: 'Success',
errors: [],
shouldDeactivate: true,
});
mockApiClient.updateWorkflow.mockResolvedValue(updatedWorkflow);
mockApiClient.deactivateWorkflow = vi.fn().mockRejectedValue({ code: 'UNKNOWN' });
const result = await handleUpdatePartialWorkflow({
id: 'test-workflow-id',
operations: [{ type: 'deactivateWorkflow' }],
}, mockRepository);
expect(result.success).toBe(false);
expect(result.error).toBe('Workflow updated successfully but deactivation failed');
expect(result.details).toEqual({
workflowUpdated: true,
deactivationError: 'Unknown error',
});
});
});
});
});

View File

@@ -1,684 +0,0 @@
/**
* Tests for EnhancedConfigValidator - Type Structure Validation
*
* Tests the integration of TypeStructureService into EnhancedConfigValidator
* for validating complex types: filter, resourceMapper, assignmentCollection, resourceLocator
*
* @group unit
* @group services
* @group validation
*/
import { describe, it, expect } from 'vitest';
import { EnhancedConfigValidator } from '@/services/enhanced-config-validator';
describe('EnhancedConfigValidator - Type Structure Validation', () => {
describe('Filter Type Validation', () => {
it('should validate valid filter configuration', () => {
const config = {
conditions: {
combinator: 'and',
conditions: [
{
id: '1',
leftValue: '{{ $json.name }}',
operator: { type: 'string', operation: 'equals' },
rightValue: 'John',
},
],
},
};
const properties = [
{
name: 'conditions',
type: 'filter',
required: true,
displayName: 'Conditions',
default: {},
},
];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(true);
expect(result.errors).toHaveLength(0);
});
it('should validate filter with multiple conditions', () => {
const config = {
conditions: {
combinator: 'or',
conditions: [
{
id: '1',
leftValue: '{{ $json.age }}',
operator: { type: 'number', operation: 'gt' },
rightValue: 18,
},
{
id: '2',
leftValue: '{{ $json.country }}',
operator: { type: 'string', operation: 'equals' },
rightValue: 'US',
},
],
},
};
const properties = [
{ name: 'conditions', type: 'filter', required: true },
];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(true);
});
it('should detect missing combinator in filter', () => {
const config = {
conditions: {
conditions: [
{
id: '1',
operator: { type: 'string', operation: 'equals' },
leftValue: 'test',
rightValue: 'value',
},
],
// Missing combinator
},
};
const properties = [{ name: 'conditions', type: 'filter', required: true }];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(false);
expect(result.errors).toContainEqual(
expect.objectContaining({
property: expect.stringMatching(/conditions/),
type: 'invalid_configuration',
})
);
});
it('should detect invalid combinator value', () => {
const config = {
conditions: {
combinator: 'invalid', // Should be 'and' or 'or'
conditions: [
{
id: '1',
operator: { type: 'string', operation: 'equals' },
leftValue: 'test',
rightValue: 'value',
},
],
},
};
const properties = [{ name: 'conditions', type: 'filter', required: true }];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(false);
});
});
describe('Filter Operation Validation', () => {
it('should validate string operations correctly', () => {
const validOperations = [
'equals',
'notEquals',
'contains',
'notContains',
'startsWith',
'endsWith',
'regex',
];
for (const operation of validOperations) {
const config = {
conditions: {
combinator: 'and',
conditions: [
{
id: '1',
operator: { type: 'string', operation },
leftValue: 'test',
rightValue: 'value',
},
],
},
};
const properties = [{ name: 'conditions', type: 'filter', required: true }];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(true);
}
});
it('should reject invalid operation for string type', () => {
const config = {
conditions: {
combinator: 'and',
conditions: [
{
id: '1',
operator: { type: 'string', operation: 'gt' }, // 'gt' is for numbers
leftValue: 'test',
rightValue: 'value',
},
],
},
};
const properties = [{ name: 'conditions', type: 'filter', required: true }];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(false);
expect(result.errors).toContainEqual(
expect.objectContaining({
property: expect.stringContaining('operator.operation'),
message: expect.stringContaining('not valid for type'),
})
);
});
it('should validate number operations correctly', () => {
const validOperations = ['equals', 'notEquals', 'gt', 'lt', 'gte', 'lte'];
for (const operation of validOperations) {
const config = {
conditions: {
combinator: 'and',
conditions: [
{
id: '1',
operator: { type: 'number', operation },
leftValue: 10,
rightValue: 20,
},
],
},
};
const properties = [{ name: 'conditions', type: 'filter', required: true }];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(true);
}
});
it('should reject string operations for number type', () => {
const config = {
conditions: {
combinator: 'and',
conditions: [
{
id: '1',
operator: { type: 'number', operation: 'contains' }, // 'contains' is for strings
leftValue: 10,
rightValue: 20,
},
],
},
};
const properties = [{ name: 'conditions', type: 'filter', required: true }];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(false);
});
it('should validate boolean operations', () => {
const config = {
conditions: {
combinator: 'and',
conditions: [
{
id: '1',
operator: { type: 'boolean', operation: 'true' },
leftValue: '{{ $json.isActive }}',
},
],
},
};
const properties = [{ name: 'conditions', type: 'filter', required: true }];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(true);
});
it('should validate dateTime operations', () => {
const config = {
conditions: {
combinator: 'and',
conditions: [
{
id: '1',
operator: { type: 'dateTime', operation: 'after' },
leftValue: '{{ $json.createdAt }}',
rightValue: '2024-01-01',
},
],
},
};
const properties = [{ name: 'conditions', type: 'filter', required: true }];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(true);
});
it('should validate array operations', () => {
const config = {
conditions: {
combinator: 'and',
conditions: [
{
id: '1',
operator: { type: 'array', operation: 'contains' },
leftValue: '{{ $json.tags }}',
rightValue: 'urgent',
},
],
},
};
const properties = [{ name: 'conditions', type: 'filter', required: true }];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(true);
});
});
describe('ResourceMapper Type Validation', () => {
it('should validate valid resourceMapper configuration', () => {
const config = {
mapping: {
mappingMode: 'defineBelow',
value: {
name: '{{ $json.fullName }}',
email: '{{ $json.emailAddress }}',
status: 'active',
},
},
};
const properties = [
{ name: 'mapping', type: 'resourceMapper', required: true },
];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.httpRequest',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(true);
});
it('should validate autoMapInputData mode', () => {
const config = {
mapping: {
mappingMode: 'autoMapInputData',
value: {},
},
};
const properties = [
{ name: 'mapping', type: 'resourceMapper', required: true },
];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.httpRequest',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(true);
});
});
describe('AssignmentCollection Type Validation', () => {
it('should validate valid assignmentCollection configuration', () => {
const config = {
assignments: {
assignments: [
{
id: '1',
name: 'userName',
value: '{{ $json.name }}',
type: 'string',
},
{
id: '2',
name: 'userAge',
value: 30,
type: 'number',
},
],
},
};
const properties = [
{ name: 'assignments', type: 'assignmentCollection', required: true },
];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.set',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(true);
});
it('should detect missing assignments array', () => {
const config = {
assignments: {
// Missing assignments array
},
};
const properties = [
{ name: 'assignments', type: 'assignmentCollection', required: true },
];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.set',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(false);
});
});
describe('ResourceLocator Type Validation', () => {
// TODO: Debug why resourceLocator tests fail - issue appears to be with base validator, not the new validation logic
it.skip('should validate valid resourceLocator by ID', () => {
const config = {
resource: {
mode: 'id',
value: 'abc123',
},
};
const properties = [
{
name: 'resource',
type: 'resourceLocator',
required: true,
displayName: 'Resource',
default: { mode: 'list', value: '' },
},
];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.googleSheets',
config,
properties,
'operation',
'ai-friendly'
);
if (!result.valid) {
console.log('DEBUG - ResourceLocator validation failed:');
console.log('Errors:', JSON.stringify(result.errors, null, 2));
}
expect(result.valid).toBe(true);
});
it.skip('should validate resourceLocator by URL', () => {
const config = {
resource: {
mode: 'url',
value: 'https://example.com/resource/123',
},
};
const properties = [
{
name: 'resource',
type: 'resourceLocator',
required: true,
displayName: 'Resource',
default: { mode: 'list', value: '' },
},
];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.googleSheets',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(true);
});
it.skip('should validate resourceLocator by list', () => {
const config = {
resource: {
mode: 'list',
value: 'item-from-dropdown',
},
};
const properties = [
{
name: 'resource',
type: 'resourceLocator',
required: true,
displayName: 'Resource',
default: { mode: 'list', value: '' },
},
];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.googleSheets',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(true);
});
});
describe('Edge Cases', () => {
it('should handle null values gracefully', () => {
const config = {
conditions: null,
};
const properties = [{ name: 'conditions', type: 'filter', required: false }];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
config,
properties,
'operation',
'ai-friendly'
);
// Null is acceptable for non-required fields
expect(result.valid).toBe(true);
});
it('should handle undefined values gracefully', () => {
const config = {};
const properties = [{ name: 'conditions', type: 'filter', required: false }];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(true);
});
it('should handle multiple special types in same config', () => {
const config = {
conditions: {
combinator: 'and',
conditions: [
{
id: '1',
operator: { type: 'string', operation: 'equals' },
leftValue: 'test',
rightValue: 'value',
},
],
},
assignments: {
assignments: [
{
id: '1',
name: 'result',
value: 'processed',
type: 'string',
},
],
},
};
const properties = [
{ name: 'conditions', type: 'filter', required: true },
{ name: 'assignments', type: 'assignmentCollection', required: true },
];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.custom',
config,
properties,
'operation',
'ai-friendly'
);
expect(result.valid).toBe(true);
});
});
describe('Validation Profiles', () => {
it('should respect strict profile for type validation', () => {
const config = {
conditions: {
combinator: 'and',
conditions: [
{
id: '1',
operator: { type: 'string', operation: 'gt' }, // Invalid operation
leftValue: 'test',
rightValue: 'value',
},
],
},
};
const properties = [{ name: 'conditions', type: 'filter', required: true }];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
config,
properties,
'operation',
'strict'
);
expect(result.valid).toBe(false);
expect(result.profile).toBe('strict');
});
it('should respect minimal profile (less strict)', () => {
const config = {
conditions: {
combinator: 'and',
conditions: [], // Empty but valid
},
};
const properties = [{ name: 'conditions', type: 'filter', required: true }];
const result = EnhancedConfigValidator.validateWithMode(
'nodes-base.filter',
config,
properties,
'operation',
'minimal'
);
expect(result.profile).toBe('minimal');
});
});
});

View File

@@ -14,8 +14,7 @@ vi.mock('@/services/node-specific-validators', () => ({
validateMongoDB: vi.fn(),
validateWebhook: vi.fn(),
validatePostgres: vi.fn(),
validateMySQL: vi.fn(),
validateAIAgent: vi.fn()
validateMySQL: vi.fn()
}
}));
@@ -1133,39 +1132,5 @@ describe('EnhancedConfigValidator', () => {
}).not.toThrow();
});
});
describe('AI Agent node validation', () => {
it('should call validateAIAgent for AI Agent nodes', () => {
const nodeType = 'nodes-langchain.agent';
const config = {
promptType: 'define',
text: 'You are a helpful assistant'
};
const properties = [
{ name: 'promptType', type: 'options', required: true },
{ name: 'text', type: 'string', required: false }
];
EnhancedConfigValidator.validateWithMode(
nodeType,
config,
properties,
'operation',
'ai-friendly'
);
// Verify the validator was called (fix for issue where it wasn't being called at all)
expect(NodeSpecificValidators.validateAIAgent).toHaveBeenCalledTimes(1);
// Verify it was called with a context object containing our config
const callArgs = (NodeSpecificValidators.validateAIAgent as any).mock.calls[0][0];
expect(callArgs).toHaveProperty('config');
expect(callArgs.config).toEqual(config);
expect(callArgs).toHaveProperty('errors');
expect(callArgs).toHaveProperty('warnings');
expect(callArgs).toHaveProperty('suggestions');
expect(callArgs).toHaveProperty('autofix');
});
});
});
});

View File

@@ -362,19 +362,19 @@ describe('N8nApiClient', () => {
it('should delete workflow successfully', async () => {
mockAxiosInstance.delete.mockResolvedValue({ data: {} });
await client.deleteWorkflow('123');
expect(mockAxiosInstance.delete).toHaveBeenCalledWith('/workflows/123');
});
it('should handle deletion error', async () => {
const error = {
const error = {
message: 'Request failed',
response: { status: 404, data: { message: 'Not found' } }
response: { status: 404, data: { message: 'Not found' } }
};
await mockAxiosInstance.simulateError('delete', error);
try {
await client.deleteWorkflow('123');
expect.fail('Should have thrown an error');
@@ -386,178 +386,6 @@ describe('N8nApiClient', () => {
});
});
describe('activateWorkflow', () => {
beforeEach(() => {
client = new N8nApiClient(defaultConfig);
});
it('should activate workflow successfully', async () => {
const workflow = { id: '123', name: 'Test', active: false, nodes: [], connections: {} };
const activatedWorkflow = { ...workflow, active: true };
mockAxiosInstance.post.mockResolvedValue({ data: activatedWorkflow });
const result = await client.activateWorkflow('123');
expect(mockAxiosInstance.post).toHaveBeenCalledWith('/workflows/123/activate');
expect(result).toEqual(activatedWorkflow);
expect(result.active).toBe(true);
});
it('should handle activation error - no trigger nodes', async () => {
const error = {
message: 'Request failed',
response: { status: 400, data: { message: 'Workflow must have at least one trigger node' } }
};
await mockAxiosInstance.simulateError('post', error);
try {
await client.activateWorkflow('123');
expect.fail('Should have thrown an error');
} catch (err) {
expect(err).toBeInstanceOf(N8nValidationError);
expect((err as N8nValidationError).message).toContain('trigger node');
expect((err as N8nValidationError).statusCode).toBe(400);
}
});
it('should handle activation error - workflow not found', async () => {
const error = {
message: 'Request failed',
response: { status: 404, data: { message: 'Workflow not found' } }
};
await mockAxiosInstance.simulateError('post', error);
try {
await client.activateWorkflow('non-existent');
expect.fail('Should have thrown an error');
} catch (err) {
expect(err).toBeInstanceOf(N8nNotFoundError);
expect((err as N8nNotFoundError).message).toContain('not found');
expect((err as N8nNotFoundError).statusCode).toBe(404);
}
});
it('should handle activation error - workflow already active', async () => {
const error = {
message: 'Request failed',
response: { status: 400, data: { message: 'Workflow is already active' } }
};
await mockAxiosInstance.simulateError('post', error);
try {
await client.activateWorkflow('123');
expect.fail('Should have thrown an error');
} catch (err) {
expect(err).toBeInstanceOf(N8nValidationError);
expect((err as N8nValidationError).message).toContain('already active');
expect((err as N8nValidationError).statusCode).toBe(400);
}
});
it('should handle server error during activation', async () => {
const error = {
message: 'Request failed',
response: { status: 500, data: { message: 'Internal server error' } }
};
await mockAxiosInstance.simulateError('post', error);
try {
await client.activateWorkflow('123');
expect.fail('Should have thrown an error');
} catch (err) {
expect(err).toBeInstanceOf(N8nServerError);
expect((err as N8nServerError).message).toBe('Internal server error');
expect((err as N8nServerError).statusCode).toBe(500);
}
});
});
describe('deactivateWorkflow', () => {
beforeEach(() => {
client = new N8nApiClient(defaultConfig);
});
it('should deactivate workflow successfully', async () => {
const workflow = { id: '123', name: 'Test', active: true, nodes: [], connections: {} };
const deactivatedWorkflow = { ...workflow, active: false };
mockAxiosInstance.post.mockResolvedValue({ data: deactivatedWorkflow });
const result = await client.deactivateWorkflow('123');
expect(mockAxiosInstance.post).toHaveBeenCalledWith('/workflows/123/deactivate');
expect(result).toEqual(deactivatedWorkflow);
expect(result.active).toBe(false);
});
it('should handle deactivation error - workflow not found', async () => {
const error = {
message: 'Request failed',
response: { status: 404, data: { message: 'Workflow not found' } }
};
await mockAxiosInstance.simulateError('post', error);
try {
await client.deactivateWorkflow('non-existent');
expect.fail('Should have thrown an error');
} catch (err) {
expect(err).toBeInstanceOf(N8nNotFoundError);
expect((err as N8nNotFoundError).message).toContain('not found');
expect((err as N8nNotFoundError).statusCode).toBe(404);
}
});
it('should handle deactivation error - workflow already inactive', async () => {
const error = {
message: 'Request failed',
response: { status: 400, data: { message: 'Workflow is already inactive' } }
};
await mockAxiosInstance.simulateError('post', error);
try {
await client.deactivateWorkflow('123');
expect.fail('Should have thrown an error');
} catch (err) {
expect(err).toBeInstanceOf(N8nValidationError);
expect((err as N8nValidationError).message).toContain('already inactive');
expect((err as N8nValidationError).statusCode).toBe(400);
}
});
it('should handle server error during deactivation', async () => {
const error = {
message: 'Request failed',
response: { status: 500, data: { message: 'Internal server error' } }
};
await mockAxiosInstance.simulateError('post', error);
try {
await client.deactivateWorkflow('123');
expect.fail('Should have thrown an error');
} catch (err) {
expect(err).toBeInstanceOf(N8nServerError);
expect((err as N8nServerError).message).toBe('Internal server error');
expect((err as N8nServerError).statusCode).toBe(500);
}
});
it('should handle authentication error during deactivation', async () => {
const error = {
message: 'Request failed',
response: { status: 401, data: { message: 'Invalid API key' } }
};
await mockAxiosInstance.simulateError('post', error);
try {
await client.deactivateWorkflow('123');
expect.fail('Should have thrown an error');
} catch (err) {
expect(err).toBeInstanceOf(N8nAuthenticationError);
expect((err as N8nAuthenticationError).message).toBe('Invalid API key');
expect((err as N8nAuthenticationError).statusCode).toBe(401);
}
});
});
describe('listWorkflows', () => {
beforeEach(() => {
client = new N8nApiClient(defaultConfig);

View File

@@ -367,23 +367,7 @@ describe('n8n-validation', () => {
expect(cleaned.name).toBe('Test Workflow');
});
it('should exclude description field for n8n API compatibility (Issue #431)', () => {
const workflow = {
name: 'Test Workflow',
description: 'This is a test workflow description',
nodes: [],
connections: {},
versionId: 'v123',
} as any;
const cleaned = cleanWorkflowForUpdate(workflow);
expect(cleaned).not.toHaveProperty('description');
expect(cleaned).not.toHaveProperty('versionId');
expect(cleaned.name).toBe('Test Workflow');
});
it('should provide minimal default settings when no settings provided (Issue #431)', () => {
it('should add empty settings object for cloud API compatibility', () => {
const workflow = {
name: 'Test Workflow',
nodes: [],
@@ -391,8 +375,7 @@ describe('n8n-validation', () => {
} as any;
const cleaned = cleanWorkflowForUpdate(workflow);
// n8n API requires settings to be present, so we provide minimal defaults (v1 is modern default)
expect(cleaned.settings).toEqual({ executionOrder: 'v1' });
expect(cleaned.settings).toEqual({});
});
it('should filter settings to safe properties to prevent API errors (Issue #248 - final fix)', () => {
@@ -484,50 +467,7 @@ describe('n8n-validation', () => {
} as any;
const cleaned = cleanWorkflowForUpdate(workflow);
// n8n API requires settings, so we provide minimal defaults (v1 is modern default)
expect(cleaned.settings).toEqual({ executionOrder: 'v1' });
});
it('should provide minimal settings when only non-whitelisted properties exist (Issue #431)', () => {
const workflow = {
name: 'Test Workflow',
nodes: [],
connections: {},
settings: {
callerPolicy: 'workflowsFromSameOwner' as const, // Filtered out
timeSavedPerExecution: 5, // Filtered out (UI-only)
someOtherProperty: 'value', // Filtered out
},
} as any;
const cleaned = cleanWorkflowForUpdate(workflow);
// All properties were filtered out, but n8n API requires settings
// so we provide minimal defaults (v1 is modern default) to avoid both
// "additional properties" and "required property" API errors
expect(cleaned.settings).toEqual({ executionOrder: 'v1' });
});
it('should preserve whitelisted settings when mixed with non-whitelisted (Issue #431)', () => {
const workflow = {
name: 'Test Workflow',
nodes: [],
connections: {},
settings: {
executionOrder: 'v1' as const, // Whitelisted
callerPolicy: 'workflowsFromSameOwner' as const, // Filtered out
timezone: 'America/New_York', // Whitelisted
someOtherProperty: 'value', // Filtered out
},
} as any;
const cleaned = cleanWorkflowForUpdate(workflow);
// Should keep only whitelisted properties
expect(cleaned.settings).toEqual({
executionOrder: 'v1',
timezone: 'America/New_York'
});
expect(cleaned.settings).not.toHaveProperty('callerPolicy');
expect(cleaned.settings).not.toHaveProperty('someOtherProperty');
expect(cleaned.settings).toEqual({});
});
});
});
@@ -1406,8 +1346,7 @@ describe('n8n-validation', () => {
expect(forUpdate).not.toHaveProperty('active');
expect(forUpdate).not.toHaveProperty('tags');
expect(forUpdate).not.toHaveProperty('meta');
// n8n API requires settings in updates, so minimal defaults (v1) are provided (Issue #431)
expect(forUpdate.settings).toEqual({ executionOrder: 'v1' });
expect(forUpdate.settings).toEqual({}); // Settings replaced with empty object for API compatibility
expect(validateWorkflowStructure(forUpdate)).toEqual([]);
});
});

View File

@@ -310,20 +310,18 @@ describe('NodeSpecificValidators', () => {
describe('validateGoogleSheets', () => {
describe('common validations', () => {
it('should require range for read operation (sheetId comes from credentials)', () => {
it('should require spreadsheet ID', () => {
context.config = {
operation: 'read'
};
NodeSpecificValidators.validateGoogleSheets(context);
// NOTE: sheetId validation was removed because it's provided by credentials, not configuration
// The actual error is missing range, which is checked first
expect(context.errors).toContainEqual({
type: 'missing_required',
property: 'range',
message: 'Range is required for read operation',
fix: 'Specify range like "Sheet1!A:B" or "Sheet1!A1:B10"'
property: 'sheetId',
message: 'Spreadsheet ID is required',
fix: 'Provide the Google Sheets document ID from the URL'
});
});
@@ -2305,416 +2303,9 @@ return [{"json": {"result": result}}]
message: 'Code nodes can throw errors - consider error handling',
suggestion: 'Add onError: "continueRegularOutput" to handle errors gracefully'
});
expect(context.autofix.onError).toBe('continueRegularOutput');
});
});
});
describe('validateAIAgent', () => {
let context: NodeValidationContext;
beforeEach(() => {
context = {
config: {},
errors: [],
warnings: [],
suggestions: [],
autofix: {}
};
});
describe('prompt configuration', () => {
it('should require text when promptType is "define"', () => {
context.config.promptType = 'define';
context.config.text = '';
NodeSpecificValidators.validateAIAgent(context);
expect(context.errors).toContainEqual({
type: 'missing_required',
property: 'text',
message: 'Custom prompt text is required when promptType is "define"',
fix: 'Provide a custom prompt in the text field, or change promptType to "auto"'
});
});
it('should not require text when promptType is "auto"', () => {
context.config.promptType = 'auto';
NodeSpecificValidators.validateAIAgent(context);
const textErrors = context.errors.filter(e => e.property === 'text');
expect(textErrors).toHaveLength(0);
});
it('should accept valid text with promptType "define"', () => {
context.config.promptType = 'define';
context.config.text = 'You are a helpful assistant that analyzes data.';
NodeSpecificValidators.validateAIAgent(context);
const textErrors = context.errors.filter(e => e.property === 'text');
expect(textErrors).toHaveLength(0);
});
it('should reject whitespace-only text with promptType "define"', () => {
// Edge case: Text is only whitespace
context.config.promptType = 'define';
context.config.text = ' \n\t ';
NodeSpecificValidators.validateAIAgent(context);
expect(context.errors).toContainEqual({
type: 'missing_required',
property: 'text',
message: 'Custom prompt text is required when promptType is "define"',
fix: 'Provide a custom prompt in the text field, or change promptType to "auto"'
});
});
it('should accept very long text with promptType "define"', () => {
// Edge case: Very long prompt text (common for complex AI agents)
context.config.promptType = 'define';
context.config.text = 'You are a helpful assistant. '.repeat(100); // 3200 characters
NodeSpecificValidators.validateAIAgent(context);
const textErrors = context.errors.filter(e => e.property === 'text');
expect(textErrors).toHaveLength(0);
});
it('should handle undefined text with promptType "define"', () => {
// Edge case: Text is undefined
context.config.promptType = 'define';
context.config.text = undefined;
NodeSpecificValidators.validateAIAgent(context);
expect(context.errors).toContainEqual({
type: 'missing_required',
property: 'text',
message: 'Custom prompt text is required when promptType is "define"',
fix: 'Provide a custom prompt in the text field, or change promptType to "auto"'
});
});
it('should handle null text with promptType "define"', () => {
// Edge case: Text is null
context.config.promptType = 'define';
context.config.text = null;
NodeSpecificValidators.validateAIAgent(context);
expect(context.errors).toContainEqual({
type: 'missing_required',
property: 'text',
message: 'Custom prompt text is required when promptType is "define"',
fix: 'Provide a custom prompt in the text field, or change promptType to "auto"'
});
});
});
describe('system message validation', () => {
it('should suggest adding system message when missing', () => {
context.config = {};
NodeSpecificValidators.validateAIAgent(context);
// Should contain a suggestion about system message
const hasSysMessageSuggestion = context.suggestions.some(s =>
s.toLowerCase().includes('system message')
);
expect(hasSysMessageSuggestion).toBe(true);
});
it('should warn when system message is too short', () => {
context.config.systemMessage = 'Help';
NodeSpecificValidators.validateAIAgent(context);
expect(context.warnings).toContainEqual({
type: 'inefficient',
property: 'systemMessage',
message: 'System message is very short (< 20 characters)',
suggestion: 'Consider a more detailed system message to guide the agent\'s behavior'
});
});
it('should accept adequate system message', () => {
context.config.systemMessage = 'You are a helpful assistant that analyzes customer feedback.';
NodeSpecificValidators.validateAIAgent(context);
const systemWarnings = context.warnings.filter(w => w.property === 'systemMessage');
expect(systemWarnings).toHaveLength(0);
});
it('should suggest adding system message when empty string', () => {
// Edge case: Empty string system message
context.config.systemMessage = '';
NodeSpecificValidators.validateAIAgent(context);
// Should contain a suggestion about system message
const hasSysMessageSuggestion = context.suggestions.some(s =>
s.toLowerCase().includes('system message')
);
expect(hasSysMessageSuggestion).toBe(true);
});
it('should suggest adding system message when whitespace only', () => {
// Edge case: Whitespace-only system message
context.config.systemMessage = ' \n\t ';
NodeSpecificValidators.validateAIAgent(context);
// Should contain a suggestion about system message
const hasSysMessageSuggestion = context.suggestions.some(s =>
s.toLowerCase().includes('system message')
);
expect(hasSysMessageSuggestion).toBe(true);
});
it('should accept very long system messages', () => {
// Edge case: Very long system message (>1000 chars) for complex agents
context.config.systemMessage = 'You are a highly specialized assistant. '.repeat(30); // ~1260 chars
NodeSpecificValidators.validateAIAgent(context);
const systemWarnings = context.warnings.filter(w => w.property === 'systemMessage');
expect(systemWarnings).toHaveLength(0);
});
it('should handle system messages with special characters', () => {
// Edge case: System message with special characters, emojis, unicode
context.config.systemMessage = 'You are an assistant 🤖 that handles data with special chars: @#$%^&*(){}[]|\\/<>~`';
NodeSpecificValidators.validateAIAgent(context);
const systemWarnings = context.warnings.filter(w => w.property === 'systemMessage');
expect(systemWarnings).toHaveLength(0);
});
it('should handle system messages with newlines and formatting', () => {
// Edge case: Multi-line system message with formatting
context.config.systemMessage = `You are a helpful assistant.
Your responsibilities include:
1. Analyzing customer feedback
2. Generating reports
3. Providing insights
Always be professional and concise.`;
NodeSpecificValidators.validateAIAgent(context);
const systemWarnings = context.warnings.filter(w => w.property === 'systemMessage');
expect(systemWarnings).toHaveLength(0);
});
it('should warn about exactly 19 character system message', () => {
// Edge case: Just under the 20 character threshold
context.config.systemMessage = 'Be a good assistant'; // 19 chars
NodeSpecificValidators.validateAIAgent(context);
expect(context.warnings).toContainEqual({
type: 'inefficient',
property: 'systemMessage',
message: 'System message is very short (< 20 characters)',
suggestion: 'Consider a more detailed system message to guide the agent\'s behavior'
});
});
it('should not warn about exactly 20 character system message', () => {
// Edge case: Exactly at the 20 character threshold
context.config.systemMessage = 'Be a great assistant'; // 20 chars
NodeSpecificValidators.validateAIAgent(context);
const systemWarnings = context.warnings.filter(w => w.property === 'systemMessage');
expect(systemWarnings).toHaveLength(0);
});
});
describe('maxIterations validation', () => {
it('should reject invalid maxIterations values', () => {
context.config.maxIterations = -5;
NodeSpecificValidators.validateAIAgent(context);
expect(context.errors).toContainEqual({
type: 'invalid_value',
property: 'maxIterations',
message: 'maxIterations must be a positive number',
fix: 'Set maxIterations to a value >= 1 (e.g., 10)'
});
});
it('should warn about very high maxIterations', () => {
context.config.maxIterations = 100;
NodeSpecificValidators.validateAIAgent(context);
expect(context.warnings).toContainEqual(
expect.objectContaining({
type: 'inefficient',
property: 'maxIterations'
})
);
});
it('should accept reasonable maxIterations', () => {
context.config.maxIterations = 15;
NodeSpecificValidators.validateAIAgent(context);
const maxIterErrors = context.errors.filter(e => e.property === 'maxIterations');
expect(maxIterErrors).toHaveLength(0);
});
it('should reject maxIterations of 0', () => {
// Edge case: Zero iterations is invalid
context.config.maxIterations = 0;
NodeSpecificValidators.validateAIAgent(context);
expect(context.errors).toContainEqual({
type: 'invalid_value',
property: 'maxIterations',
message: 'maxIterations must be a positive number',
fix: 'Set maxIterations to a value >= 1 (e.g., 10)'
});
});
it('should accept maxIterations of 1', () => {
// Edge case: Minimum valid value
context.config.maxIterations = 1;
NodeSpecificValidators.validateAIAgent(context);
const maxIterErrors = context.errors.filter(e => e.property === 'maxIterations');
expect(maxIterErrors).toHaveLength(0);
});
it('should warn about maxIterations of 51', () => {
// Edge case: Just above the threshold (50)
context.config.maxIterations = 51;
NodeSpecificValidators.validateAIAgent(context);
expect(context.warnings).toContainEqual(
expect.objectContaining({
type: 'inefficient',
property: 'maxIterations',
message: expect.stringContaining('51')
})
);
});
it('should handle extreme maxIterations values', () => {
// Edge case: Very large number
context.config.maxIterations = Number.MAX_SAFE_INTEGER;
NodeSpecificValidators.validateAIAgent(context);
expect(context.warnings).toContainEqual(
expect.objectContaining({
type: 'inefficient',
property: 'maxIterations'
})
);
});
it('should reject NaN maxIterations', () => {
// Edge case: Not a number
context.config.maxIterations = 'invalid';
NodeSpecificValidators.validateAIAgent(context);
expect(context.errors).toContainEqual({
type: 'invalid_value',
property: 'maxIterations',
message: 'maxIterations must be a positive number',
fix: 'Set maxIterations to a value >= 1 (e.g., 10)'
});
});
it('should reject negative decimal maxIterations', () => {
// Edge case: Negative decimal
context.config.maxIterations = -0.5;
NodeSpecificValidators.validateAIAgent(context);
expect(context.errors).toContainEqual({
type: 'invalid_value',
property: 'maxIterations',
message: 'maxIterations must be a positive number',
fix: 'Set maxIterations to a value >= 1 (e.g., 10)'
});
});
});
describe('error handling', () => {
it('should suggest error handling when not configured', () => {
context.config = {};
NodeSpecificValidators.validateAIAgent(context);
expect(context.warnings).toContainEqual({
type: 'best_practice',
property: 'errorHandling',
message: 'AI models can fail due to API limits, rate limits, or invalid responses',
suggestion: 'Add onError: "continueRegularOutput" with retryOnFail for resilience'
});
expect(context.autofix).toMatchObject({
onError: 'continueRegularOutput',
retryOnFail: true,
maxTries: 2,
waitBetweenTries: 5000
});
});
it('should warn about deprecated continueOnFail', () => {
context.config.continueOnFail = true;
NodeSpecificValidators.validateAIAgent(context);
expect(context.warnings).toContainEqual({
type: 'deprecated',
property: 'continueOnFail',
message: 'continueOnFail is deprecated. Use onError instead',
suggestion: 'Replace with onError: "continueRegularOutput" or "stopWorkflow"'
});
});
});
describe('output parser and fallback warnings', () => {
it('should warn when output parser is enabled', () => {
context.config.hasOutputParser = true;
NodeSpecificValidators.validateAIAgent(context);
expect(context.warnings).toContainEqual(
expect.objectContaining({
property: 'hasOutputParser'
})
);
});
it('should warn when fallback model is enabled', () => {
context.config.needsFallback = true;
NodeSpecificValidators.validateAIAgent(context);
expect(context.warnings).toContainEqual(
expect.objectContaining({
property: 'needsFallback'
})
);
});
});
});
});

View File

@@ -1,558 +0,0 @@
/**
* Tests for TypeStructureService
*
* @group unit
* @group services
*/
import { describe, it, expect } from 'vitest';
import { TypeStructureService } from '@/services/type-structure-service';
import type { NodePropertyTypes } from 'n8n-workflow';
describe('TypeStructureService', () => {
describe('getStructure', () => {
it('should return structure for valid types', () => {
const types: NodePropertyTypes[] = [
'string',
'number',
'collection',
'filter',
];
for (const type of types) {
const structure = TypeStructureService.getStructure(type);
expect(structure).not.toBeNull();
expect(structure!.type).toBeDefined();
expect(structure!.jsType).toBeDefined();
}
});
it('should return null for unknown types', () => {
const structure = TypeStructureService.getStructure('unknown' as NodePropertyTypes);
expect(structure).toBeNull();
});
it('should return correct structure for string type', () => {
const structure = TypeStructureService.getStructure('string');
expect(structure).not.toBeNull();
expect(structure!.type).toBe('primitive');
expect(structure!.jsType).toBe('string');
expect(structure!.description).toContain('text');
});
it('should return correct structure for collection type', () => {
const structure = TypeStructureService.getStructure('collection');
expect(structure).not.toBeNull();
expect(structure!.type).toBe('collection');
expect(structure!.jsType).toBe('object');
expect(structure!.structure).toBeDefined();
});
it('should return correct structure for filter type', () => {
const structure = TypeStructureService.getStructure('filter');
expect(structure).not.toBeNull();
expect(structure!.type).toBe('special');
expect(structure!.structure?.properties?.conditions).toBeDefined();
expect(structure!.structure?.properties?.combinator).toBeDefined();
});
});
describe('getAllStructures', () => {
it('should return all 22 type structures', () => {
const structures = TypeStructureService.getAllStructures();
expect(Object.keys(structures)).toHaveLength(22);
});
it('should return a copy not a reference', () => {
const structures1 = TypeStructureService.getAllStructures();
const structures2 = TypeStructureService.getAllStructures();
expect(structures1).not.toBe(structures2);
});
it('should include all expected types', () => {
const structures = TypeStructureService.getAllStructures();
const expectedTypes = [
'string',
'number',
'boolean',
'collection',
'filter',
];
for (const type of expectedTypes) {
expect(structures).toHaveProperty(type);
}
});
});
describe('getExample', () => {
it('should return example for valid types', () => {
const types: NodePropertyTypes[] = [
'string',
'number',
'boolean',
'collection',
];
for (const type of types) {
const example = TypeStructureService.getExample(type);
expect(example).toBeDefined();
}
});
it('should return null for unknown types', () => {
const example = TypeStructureService.getExample('unknown' as NodePropertyTypes);
expect(example).toBeNull();
});
it('should return string for string type', () => {
const example = TypeStructureService.getExample('string');
expect(typeof example).toBe('string');
});
it('should return number for number type', () => {
const example = TypeStructureService.getExample('number');
expect(typeof example).toBe('number');
});
it('should return boolean for boolean type', () => {
const example = TypeStructureService.getExample('boolean');
expect(typeof example).toBe('boolean');
});
it('should return object for collection type', () => {
const example = TypeStructureService.getExample('collection');
expect(typeof example).toBe('object');
expect(example).not.toBeNull();
});
it('should return array for multiOptions type', () => {
const example = TypeStructureService.getExample('multiOptions');
expect(Array.isArray(example)).toBe(true);
});
it('should return valid filter example', () => {
const example = TypeStructureService.getExample('filter');
expect(example).toHaveProperty('conditions');
expect(example).toHaveProperty('combinator');
});
});
describe('getExamples', () => {
it('should return array of examples', () => {
const examples = TypeStructureService.getExamples('string');
expect(Array.isArray(examples)).toBe(true);
expect(examples.length).toBeGreaterThan(0);
});
it('should return empty array for unknown types', () => {
const examples = TypeStructureService.getExamples('unknown' as NodePropertyTypes);
expect(examples).toEqual([]);
});
it('should return multiple examples when available', () => {
const examples = TypeStructureService.getExamples('string');
expect(examples.length).toBeGreaterThan(1);
});
it('should return single example array when no examples array exists', () => {
// Some types might not have multiple examples
const examples = TypeStructureService.getExamples('button');
expect(Array.isArray(examples)).toBe(true);
});
});
describe('isComplexType', () => {
it('should identify complex types correctly', () => {
const complexTypes: NodePropertyTypes[] = [
'collection',
'fixedCollection',
'resourceLocator',
'resourceMapper',
'filter',
'assignmentCollection',
];
for (const type of complexTypes) {
expect(TypeStructureService.isComplexType(type)).toBe(true);
}
});
it('should return false for non-complex types', () => {
const nonComplexTypes: NodePropertyTypes[] = [
'string',
'number',
'boolean',
'options',
'multiOptions',
];
for (const type of nonComplexTypes) {
expect(TypeStructureService.isComplexType(type)).toBe(false);
}
});
});
describe('isPrimitiveType', () => {
it('should identify primitive types correctly', () => {
const primitiveTypes: NodePropertyTypes[] = [
'string',
'number',
'boolean',
'dateTime',
'color',
'json',
];
for (const type of primitiveTypes) {
expect(TypeStructureService.isPrimitiveType(type)).toBe(true);
}
});
it('should return false for non-primitive types', () => {
const nonPrimitiveTypes: NodePropertyTypes[] = [
'collection',
'fixedCollection',
'options',
'filter',
];
for (const type of nonPrimitiveTypes) {
expect(TypeStructureService.isPrimitiveType(type)).toBe(false);
}
});
});
describe('getComplexTypes', () => {
it('should return array of complex types', () => {
const complexTypes = TypeStructureService.getComplexTypes();
expect(Array.isArray(complexTypes)).toBe(true);
expect(complexTypes.length).toBe(6);
});
it('should include all expected complex types', () => {
const complexTypes = TypeStructureService.getComplexTypes();
const expected = [
'collection',
'fixedCollection',
'resourceLocator',
'resourceMapper',
'filter',
'assignmentCollection',
];
for (const type of expected) {
expect(complexTypes).toContain(type);
}
});
it('should not include primitive types', () => {
const complexTypes = TypeStructureService.getComplexTypes();
expect(complexTypes).not.toContain('string');
expect(complexTypes).not.toContain('number');
expect(complexTypes).not.toContain('boolean');
});
});
describe('getPrimitiveTypes', () => {
it('should return array of primitive types', () => {
const primitiveTypes = TypeStructureService.getPrimitiveTypes();
expect(Array.isArray(primitiveTypes)).toBe(true);
expect(primitiveTypes.length).toBe(6);
});
it('should include all expected primitive types', () => {
const primitiveTypes = TypeStructureService.getPrimitiveTypes();
const expected = ['string', 'number', 'boolean', 'dateTime', 'color', 'json'];
for (const type of expected) {
expect(primitiveTypes).toContain(type);
}
});
it('should not include complex types', () => {
const primitiveTypes = TypeStructureService.getPrimitiveTypes();
expect(primitiveTypes).not.toContain('collection');
expect(primitiveTypes).not.toContain('filter');
});
});
describe('getComplexExamples', () => {
it('should return examples for complex types', () => {
const examples = TypeStructureService.getComplexExamples('collection');
expect(examples).not.toBeNull();
expect(typeof examples).toBe('object');
});
it('should return null for types without complex examples', () => {
const examples = TypeStructureService.getComplexExamples(
'resourceLocator' as any
);
expect(examples).toBeNull();
});
it('should return multiple scenarios for fixedCollection', () => {
const examples = TypeStructureService.getComplexExamples('fixedCollection');
expect(examples).not.toBeNull();
expect(Object.keys(examples!).length).toBeGreaterThan(0);
});
it('should return valid filter examples', () => {
const examples = TypeStructureService.getComplexExamples('filter');
expect(examples).not.toBeNull();
expect(examples!.simple).toBeDefined();
expect(examples!.complex).toBeDefined();
});
});
describe('validateTypeCompatibility', () => {
describe('String Type', () => {
it('should validate string values', () => {
const result = TypeStructureService.validateTypeCompatibility(
'Hello World',
'string'
);
expect(result.valid).toBe(true);
expect(result.errors).toHaveLength(0);
});
it('should reject non-string values', () => {
const result = TypeStructureService.validateTypeCompatibility(123, 'string');
expect(result.valid).toBe(false);
expect(result.errors.length).toBeGreaterThan(0);
});
it('should allow expressions in strings', () => {
const result = TypeStructureService.validateTypeCompatibility(
'{{ $json.name }}',
'string'
);
expect(result.valid).toBe(true);
});
});
describe('Number Type', () => {
it('should validate number values', () => {
const result = TypeStructureService.validateTypeCompatibility(42, 'number');
expect(result.valid).toBe(true);
expect(result.errors).toHaveLength(0);
});
it('should reject non-number values', () => {
const result = TypeStructureService.validateTypeCompatibility(
'not a number',
'number'
);
expect(result.valid).toBe(false);
expect(result.errors.length).toBeGreaterThan(0);
});
});
describe('Boolean Type', () => {
it('should validate boolean values', () => {
const result = TypeStructureService.validateTypeCompatibility(
true,
'boolean'
);
expect(result.valid).toBe(true);
expect(result.errors).toHaveLength(0);
});
it('should reject non-boolean values', () => {
const result = TypeStructureService.validateTypeCompatibility(
'true',
'boolean'
);
expect(result.valid).toBe(false);
});
});
describe('DateTime Type', () => {
it('should validate ISO 8601 format', () => {
const result = TypeStructureService.validateTypeCompatibility(
'2024-01-20T10:30:00Z',
'dateTime'
);
expect(result.valid).toBe(true);
});
it('should validate date-only format', () => {
const result = TypeStructureService.validateTypeCompatibility(
'2024-01-20',
'dateTime'
);
expect(result.valid).toBe(true);
});
it('should reject invalid date formats', () => {
const result = TypeStructureService.validateTypeCompatibility(
'not a date',
'dateTime'
);
expect(result.valid).toBe(false);
});
});
describe('Color Type', () => {
it('should validate hex colors', () => {
const result = TypeStructureService.validateTypeCompatibility(
'#FF5733',
'color'
);
expect(result.valid).toBe(true);
});
it('should reject invalid color formats', () => {
const result = TypeStructureService.validateTypeCompatibility(
'red',
'color'
);
expect(result.valid).toBe(false);
});
it('should reject short hex colors', () => {
const result = TypeStructureService.validateTypeCompatibility(
'#FFF',
'color'
);
expect(result.valid).toBe(false);
});
});
describe('JSON Type', () => {
it('should validate valid JSON strings', () => {
const result = TypeStructureService.validateTypeCompatibility(
'{"key": "value"}',
'json'
);
expect(result.valid).toBe(true);
});
it('should reject invalid JSON', () => {
const result = TypeStructureService.validateTypeCompatibility(
'{invalid json}',
'json'
);
expect(result.valid).toBe(false);
});
});
describe('Array Types', () => {
it('should validate arrays for multiOptions', () => {
const result = TypeStructureService.validateTypeCompatibility(
['option1', 'option2'],
'multiOptions'
);
expect(result.valid).toBe(true);
});
it('should reject non-arrays for multiOptions', () => {
const result = TypeStructureService.validateTypeCompatibility(
'option1',
'multiOptions'
);
expect(result.valid).toBe(false);
});
});
describe('Object Types', () => {
it('should validate objects for collection', () => {
const result = TypeStructureService.validateTypeCompatibility(
{ name: 'John', age: 30 },
'collection'
);
expect(result.valid).toBe(true);
});
it('should reject arrays for collection', () => {
const result = TypeStructureService.validateTypeCompatibility(
['not', 'an', 'object'],
'collection'
);
expect(result.valid).toBe(false);
});
});
describe('Null and Undefined', () => {
it('should handle null values based on allowEmpty', () => {
const result = TypeStructureService.validateTypeCompatibility(
null,
'string'
);
// String allows empty
expect(result.valid).toBe(true);
});
it('should reject null for required types', () => {
const result = TypeStructureService.validateTypeCompatibility(
null,
'number'
);
expect(result.valid).toBe(false);
});
});
describe('Unknown Types', () => {
it('should handle unknown types gracefully', () => {
const result = TypeStructureService.validateTypeCompatibility(
'value',
'unknownType' as NodePropertyTypes
);
expect(result.valid).toBe(false);
expect(result.errors[0]).toContain('Unknown property type');
});
});
});
describe('getDescription', () => {
it('should return description for valid types', () => {
const description = TypeStructureService.getDescription('string');
expect(description).not.toBeNull();
expect(typeof description).toBe('string');
expect(description!.length).toBeGreaterThan(0);
});
it('should return null for unknown types', () => {
const description = TypeStructureService.getDescription(
'unknown' as NodePropertyTypes
);
expect(description).toBeNull();
});
});
describe('getNotes', () => {
it('should return notes for types that have them', () => {
const notes = TypeStructureService.getNotes('filter');
expect(Array.isArray(notes)).toBe(true);
expect(notes.length).toBeGreaterThan(0);
});
it('should return empty array for types without notes', () => {
const notes = TypeStructureService.getNotes('number');
expect(Array.isArray(notes)).toBe(true);
});
});
describe('getJavaScriptType', () => {
it('should return correct JavaScript type for primitives', () => {
expect(TypeStructureService.getJavaScriptType('string')).toBe('string');
expect(TypeStructureService.getJavaScriptType('number')).toBe('number');
expect(TypeStructureService.getJavaScriptType('boolean')).toBe('boolean');
});
it('should return object for collection types', () => {
expect(TypeStructureService.getJavaScriptType('collection')).toBe('object');
expect(TypeStructureService.getJavaScriptType('filter')).toBe('object');
});
it('should return array for multiOptions', () => {
expect(TypeStructureService.getJavaScriptType('multiOptions')).toBe('array');
});
it('should return null for unknown types', () => {
expect(
TypeStructureService.getJavaScriptType('unknown' as NodePropertyTypes)
).toBeNull();
});
});
});

View File

@@ -380,52 +380,10 @@ describe('WorkflowDiffEngine', () => {
};
const result = await diffEngine.applyDiff(baseWorkflow, request);
expect(result.success).toBe(false);
expect(result.errors![0].message).toContain('Node not found');
});
it('should provide helpful error when using "changes" instead of "updates" (Issue #392)', async () => {
// Simulate the common mistake of using "changes" instead of "updates"
const operation: any = {
type: 'updateNode',
nodeId: 'http-1',
changes: { // Wrong property name
'parameters.url': 'https://example.com'
}
};
const request: WorkflowDiffRequest = {
id: 'test-workflow',
operations: [operation]
};
const result = await diffEngine.applyDiff(baseWorkflow, request);
expect(result.success).toBe(false);
expect(result.errors![0].message).toContain('Invalid parameter \'changes\'');
expect(result.errors![0].message).toContain('requires \'updates\'');
expect(result.errors![0].message).toContain('Example:');
});
it('should provide helpful error when "updates" parameter is missing', async () => {
const operation: any = {
type: 'updateNode',
nodeId: 'http-1'
// Missing "updates" property
};
const request: WorkflowDiffRequest = {
id: 'test-workflow',
operations: [operation]
};
const result = await diffEngine.applyDiff(baseWorkflow, request);
expect(result.success).toBe(false);
expect(result.errors![0].message).toContain('Missing required parameter \'updates\'');
expect(result.errors![0].message).toContain('Example:');
});
});
describe('MoveNode Operation', () => {
@@ -4311,358 +4269,4 @@ describe('WorkflowDiffEngine', () => {
expect(result.workflow.connections["When clicking 'Execute workflow'"]).toBeDefined();
});
});
describe('Workflow Activation/Deactivation Operations', () => {
it('should activate workflow with activatable trigger nodes', async () => {
// Create workflow with webhook trigger (activatable)
const workflowWithTrigger = createWorkflow('Test Workflow')
.addWebhookNode({ id: 'webhook-1', name: 'Webhook Trigger' })
.addHttpRequestNode({ id: 'http-1', name: 'HTTP Request' })
.connect('webhook-1', 'http-1')
.build() as Workflow;
// Fix connections to use node names
const newConnections: any = {};
for (const [nodeId, outputs] of Object.entries(workflowWithTrigger.connections)) {
const node = workflowWithTrigger.nodes.find((n: any) => n.id === nodeId);
if (node) {
newConnections[node.name] = {};
for (const [outputName, connections] of Object.entries(outputs)) {
newConnections[node.name][outputName] = (connections as any[]).map((conns: any) =>
conns.map((conn: any) => {
const targetNode = workflowWithTrigger.nodes.find((n: any) => n.id === conn.node);
return { ...conn, node: targetNode ? targetNode.name : conn.node };
})
);
}
}
}
workflowWithTrigger.connections = newConnections;
const operation: any = {
type: 'activateWorkflow'
};
const request: WorkflowDiffRequest = {
id: 'test-workflow',
operations: [operation]
};
const result = await diffEngine.applyDiff(workflowWithTrigger, request);
expect(result.success).toBe(true);
expect(result.shouldActivate).toBe(true);
expect((result.workflow as any)._shouldActivate).toBeUndefined(); // Flag should be cleaned up
});
it('should reject activation if no activatable trigger nodes', async () => {
// Create workflow with no trigger nodes at all
const workflowWithoutActivatableTrigger = createWorkflow('Test Workflow')
.addNode({
id: 'set-1',
name: 'Set Node',
type: 'n8n-nodes-base.set',
typeVersion: 1,
position: [100, 100],
parameters: {}
})
.addHttpRequestNode({ id: 'http-1', name: 'HTTP Request' })
.connect('set-1', 'http-1')
.build() as Workflow;
// Fix connections to use node names
const newConnections: any = {};
for (const [nodeId, outputs] of Object.entries(workflowWithoutActivatableTrigger.connections)) {
const node = workflowWithoutActivatableTrigger.nodes.find((n: any) => n.id === nodeId);
if (node) {
newConnections[node.name] = {};
for (const [outputName, connections] of Object.entries(outputs)) {
newConnections[node.name][outputName] = (connections as any[]).map((conns: any) =>
conns.map((conn: any) => {
const targetNode = workflowWithoutActivatableTrigger.nodes.find((n: any) => n.id === conn.node);
return { ...conn, node: targetNode ? targetNode.name : conn.node };
})
);
}
}
}
workflowWithoutActivatableTrigger.connections = newConnections;
const operation: any = {
type: 'activateWorkflow'
};
const request: WorkflowDiffRequest = {
id: 'test-workflow',
operations: [operation]
};
const result = await diffEngine.applyDiff(workflowWithoutActivatableTrigger, request);
expect(result.success).toBe(false);
expect(result.errors).toBeDefined();
expect(result.errors![0].message).toContain('No activatable trigger nodes found');
expect(result.errors![0].message).toContain('executeWorkflowTrigger cannot activate workflows');
});
it('should reject activation if all trigger nodes are disabled', async () => {
// Create workflow with disabled webhook trigger
const workflowWithDisabledTrigger = createWorkflow('Test Workflow')
.addWebhookNode({ id: 'webhook-1', name: 'Webhook Trigger', disabled: true })
.addHttpRequestNode({ id: 'http-1', name: 'HTTP Request' })
.connect('webhook-1', 'http-1')
.build() as Workflow;
// Fix connections to use node names
const newConnections: any = {};
for (const [nodeId, outputs] of Object.entries(workflowWithDisabledTrigger.connections)) {
const node = workflowWithDisabledTrigger.nodes.find((n: any) => n.id === nodeId);
if (node) {
newConnections[node.name] = {};
for (const [outputName, connections] of Object.entries(outputs)) {
newConnections[node.name][outputName] = (connections as any[]).map((conns: any) =>
conns.map((conn: any) => {
const targetNode = workflowWithDisabledTrigger.nodes.find((n: any) => n.id === conn.node);
return { ...conn, node: targetNode ? targetNode.name : conn.node };
})
);
}
}
}
workflowWithDisabledTrigger.connections = newConnections;
const operation: any = {
type: 'activateWorkflow'
};
const request: WorkflowDiffRequest = {
id: 'test-workflow',
operations: [operation]
};
const result = await diffEngine.applyDiff(workflowWithDisabledTrigger, request);
expect(result.success).toBe(false);
expect(result.errors).toBeDefined();
expect(result.errors![0].message).toContain('No activatable trigger nodes found');
});
it('should activate workflow with schedule trigger', async () => {
// Create workflow with schedule trigger (activatable)
const workflowWithSchedule = createWorkflow('Test Workflow')
.addNode({
id: 'schedule-1',
name: 'Schedule',
type: 'n8n-nodes-base.scheduleTrigger',
typeVersion: 1,
position: [100, 100],
parameters: { rule: { interval: [{ field: 'hours', hoursInterval: 1 }] } }
})
.addHttpRequestNode({ id: 'http-1', name: 'HTTP Request' })
.connect('schedule-1', 'http-1')
.build() as Workflow;
// Fix connections
const newConnections: any = {};
for (const [nodeId, outputs] of Object.entries(workflowWithSchedule.connections)) {
const node = workflowWithSchedule.nodes.find((n: any) => n.id === nodeId);
if (node) {
newConnections[node.name] = {};
for (const [outputName, connections] of Object.entries(outputs)) {
newConnections[node.name][outputName] = (connections as any[]).map((conns: any) =>
conns.map((conn: any) => {
const targetNode = workflowWithSchedule.nodes.find((n: any) => n.id === conn.node);
return { ...conn, node: targetNode ? targetNode.name : conn.node };
})
);
}
}
}
workflowWithSchedule.connections = newConnections;
const operation: any = {
type: 'activateWorkflow'
};
const request: WorkflowDiffRequest = {
id: 'test-workflow',
operations: [operation]
};
const result = await diffEngine.applyDiff(workflowWithSchedule, request);
expect(result.success).toBe(true);
expect(result.shouldActivate).toBe(true);
});
it('should deactivate workflow successfully', async () => {
// Any workflow can be deactivated
const operation: any = {
type: 'deactivateWorkflow'
};
const request: WorkflowDiffRequest = {
id: 'test-workflow',
operations: [operation]
};
const result = await diffEngine.applyDiff(baseWorkflow, request);
expect(result.success).toBe(true);
expect(result.shouldDeactivate).toBe(true);
expect((result.workflow as any)._shouldDeactivate).toBeUndefined(); // Flag should be cleaned up
});
it('should deactivate workflow without trigger nodes', async () => {
// Create workflow without any trigger nodes
const workflowWithoutTrigger = createWorkflow('Test Workflow')
.addHttpRequestNode({ id: 'http-1', name: 'HTTP Request' })
.addNode({
id: 'set-1',
name: 'Set',
type: 'n8n-nodes-base.set',
typeVersion: 1,
position: [300, 100],
parameters: {}
})
.connect('http-1', 'set-1')
.build() as Workflow;
// Fix connections
const newConnections: any = {};
for (const [nodeId, outputs] of Object.entries(workflowWithoutTrigger.connections)) {
const node = workflowWithoutTrigger.nodes.find((n: any) => n.id === nodeId);
if (node) {
newConnections[node.name] = {};
for (const [outputName, connections] of Object.entries(outputs)) {
newConnections[node.name][outputName] = (connections as any[]).map((conns: any) =>
conns.map((conn: any) => {
const targetNode = workflowWithoutTrigger.nodes.find((n: any) => n.id === conn.node);
return { ...conn, node: targetNode ? targetNode.name : conn.node };
})
);
}
}
}
workflowWithoutTrigger.connections = newConnections;
const operation: any = {
type: 'deactivateWorkflow'
};
const request: WorkflowDiffRequest = {
id: 'test-workflow',
operations: [operation]
};
const result = await diffEngine.applyDiff(workflowWithoutTrigger, request);
expect(result.success).toBe(true);
expect(result.shouldDeactivate).toBe(true);
});
it('should combine activation with other operations', async () => {
// Create workflow with webhook trigger
const workflowWithTrigger = createWorkflow('Test Workflow')
.addWebhookNode({ id: 'webhook-1', name: 'Webhook Trigger' })
.addHttpRequestNode({ id: 'http-1', name: 'HTTP Request' })
.connect('webhook-1', 'http-1')
.build() as Workflow;
// Fix connections
const newConnections: any = {};
for (const [nodeId, outputs] of Object.entries(workflowWithTrigger.connections)) {
const node = workflowWithTrigger.nodes.find((n: any) => n.id === nodeId);
if (node) {
newConnections[node.name] = {};
for (const [outputName, connections] of Object.entries(outputs)) {
newConnections[node.name][outputName] = (connections as any[]).map((conns: any) =>
conns.map((conn: any) => {
const targetNode = workflowWithTrigger.nodes.find((n: any) => n.id === conn.node);
return { ...conn, node: targetNode ? targetNode.name : conn.node };
})
);
}
}
}
workflowWithTrigger.connections = newConnections;
const operations: any[] = [
{
type: 'updateName',
name: 'Updated Workflow Name'
},
{
type: 'addTag',
tag: 'production'
},
{
type: 'activateWorkflow'
}
];
const request: WorkflowDiffRequest = {
id: 'test-workflow',
operations
};
const result = await diffEngine.applyDiff(workflowWithTrigger, request);
expect(result.success).toBe(true);
expect(result.operationsApplied).toBe(3);
expect(result.workflow!.name).toBe('Updated Workflow Name');
expect(result.workflow!.tags).toContain('production');
expect(result.shouldActivate).toBe(true);
});
it('should reject activation if workflow has executeWorkflowTrigger only', async () => {
// Create workflow with executeWorkflowTrigger (not activatable - Issue #351)
const workflowWithExecuteTrigger = createWorkflow('Test Workflow')
.addNode({
id: 'execute-1',
name: 'Execute Workflow Trigger',
type: 'n8n-nodes-base.executeWorkflowTrigger',
typeVersion: 1,
position: [100, 100],
parameters: {}
})
.addHttpRequestNode({ id: 'http-1', name: 'HTTP Request' })
.connect('execute-1', 'http-1')
.build() as Workflow;
// Fix connections
const newConnections: any = {};
for (const [nodeId, outputs] of Object.entries(workflowWithExecuteTrigger.connections)) {
const node = workflowWithExecuteTrigger.nodes.find((n: any) => n.id === nodeId);
if (node) {
newConnections[node.name] = {};
for (const [outputName, connections] of Object.entries(outputs)) {
newConnections[node.name][outputName] = (connections as any[]).map((conns: any) =>
conns.map((conn: any) => {
const targetNode = workflowWithExecuteTrigger.nodes.find((n: any) => n.id === conn.node);
return { ...conn, node: targetNode ? targetNode.name : conn.node };
})
);
}
}
}
workflowWithExecuteTrigger.connections = newConnections;
const operation: any = {
type: 'activateWorkflow'
};
const request: WorkflowDiffRequest = {
id: 'test-workflow',
operations: [operation]
};
const result = await diffEngine.applyDiff(workflowWithExecuteTrigger, request);
expect(result.success).toBe(false);
expect(result.errors).toBeDefined();
expect(result.errors![0].message).toContain('No activatable trigger nodes found');
expect(result.errors![0].message).toContain('executeWorkflowTrigger cannot activate workflows');
});
});
});

View File

@@ -160,22 +160,11 @@ describe('Workflow FixedCollection Validation', () => {
});
expect(result.valid).toBe(false);
// Type Structure Validation (v2.23.0) now catches multiple filter structure errors:
// 1. Missing combinator field
// 2. Missing conditions field
// 3. Invalid nested structure (conditions.values)
expect(result.errors).toHaveLength(3);
// All errors should be for the If node
const ifErrors = result.errors.filter(e => e.nodeId === 'if');
expect(ifErrors).toHaveLength(3);
// Check for the main structure error
const structureError = ifErrors.find(e => e.message.includes('Invalid structure'));
expect(structureError).toBeDefined();
expect(structureError!.message).toContain('conditions.values');
expect(structureError!.message).toContain('propertyValues[itemName] is not iterable');
expect(result.errors).toHaveLength(1);
const ifError = result.errors.find(e => e.nodeId === 'if');
expect(ifError).toBeDefined();
expect(ifError!.message).toContain('Invalid structure for nodes-base.if node');
});
test('should accept valid Switch node structure in workflow validation', async () => {

View File

@@ -278,297 +278,9 @@ describe('WorkflowValidator', () => {
describe('validation options', () => {
it('should support profiles when different validation levels are needed', () => {
const profiles = ['minimal', 'runtime', 'ai-friendly', 'strict'];
expect(profiles).toContain('minimal');
expect(profiles).toContain('runtime');
});
});
describe('duplicate node ID validation', () => {
it('should detect duplicate node IDs and provide helpful context', () => {
const workflow = {
name: 'Test Workflow with Duplicate IDs',
nodes: [
{
id: 'abc123',
name: 'First Node',
type: 'n8n-nodes-base.httpRequest',
typeVersion: 3,
position: [250, 300],
parameters: {}
},
{
id: 'abc123', // Duplicate ID
name: 'Second Node',
type: 'n8n-nodes-base.set',
typeVersion: 2,
position: [450, 300],
parameters: {}
}
],
connections: {}
};
// Simulate validation logic
const nodeIds = new Set<string>();
const nodeIdToIndex = new Map<string, number>();
const errors: Array<{ message: string }> = [];
for (let i = 0; i < workflow.nodes.length; i++) {
const node = workflow.nodes[i];
if (nodeIds.has(node.id)) {
const firstNodeIndex = nodeIdToIndex.get(node.id);
const firstNode = firstNodeIndex !== undefined ? workflow.nodes[firstNodeIndex] : undefined;
errors.push({
message: `Duplicate node ID: "${node.id}". Node at index ${i} (name: "${node.name}", type: "${node.type}") conflicts with node at index ${firstNodeIndex} (name: "${firstNode?.name || 'unknown'}", type: "${firstNode?.type || 'unknown'}")`
});
} else {
nodeIds.add(node.id);
nodeIdToIndex.set(node.id, i);
}
}
expect(errors).toHaveLength(1);
expect(errors[0].message).toContain('Duplicate node ID: "abc123"');
expect(errors[0].message).toContain('index 1');
expect(errors[0].message).toContain('Second Node');
expect(errors[0].message).toContain('n8n-nodes-base.set');
expect(errors[0].message).toContain('index 0');
expect(errors[0].message).toContain('First Node');
});
it('should include UUID generation example in error message context', () => {
const workflow = {
name: 'Test',
nodes: [
{ id: 'dup', name: 'A', type: 'n8n-nodes-base.webhook', typeVersion: 1, position: [0, 0], parameters: {} },
{ id: 'dup', name: 'B', type: 'n8n-nodes-base.webhook', typeVersion: 1, position: [0, 0], parameters: {} }
],
connections: {}
};
// Error message should contain UUID example pattern
const expectedPattern = /crypto\.randomUUID\(\)/;
// This validates that our implementation uses the pattern
expect(expectedPattern.test('crypto.randomUUID()')).toBe(true);
});
it('should detect multiple nodes with the same duplicate ID', () => {
// Edge case: Three or more nodes with the same ID
const workflow = {
name: 'Test Workflow with Multiple Duplicates',
nodes: [
{
id: 'shared-id',
name: 'First Node',
type: 'n8n-nodes-base.httpRequest',
typeVersion: 3,
position: [250, 300],
parameters: {}
},
{
id: 'shared-id', // Duplicate 1
name: 'Second Node',
type: 'n8n-nodes-base.set',
typeVersion: 2,
position: [450, 300],
parameters: {}
},
{
id: 'shared-id', // Duplicate 2
name: 'Third Node',
type: 'n8n-nodes-base.code',
typeVersion: 1,
position: [650, 300],
parameters: {}
}
],
connections: {}
};
// Simulate validation logic
const nodeIds = new Set<string>();
const nodeIdToIndex = new Map<string, number>();
const errors: Array<{ message: string }> = [];
for (let i = 0; i < workflow.nodes.length; i++) {
const node = workflow.nodes[i];
if (nodeIds.has(node.id)) {
const firstNodeIndex = nodeIdToIndex.get(node.id);
const firstNode = firstNodeIndex !== undefined ? workflow.nodes[firstNodeIndex] : undefined;
errors.push({
message: `Duplicate node ID: "${node.id}". Node at index ${i} (name: "${node.name}", type: "${node.type}") conflicts with node at index ${firstNodeIndex} (name: "${firstNode?.name || 'unknown'}", type: "${firstNode?.type || 'unknown'}")`
});
} else {
nodeIds.add(node.id);
nodeIdToIndex.set(node.id, i);
}
}
// Should report 2 errors (nodes at index 1 and 2 both conflict with node at index 0)
expect(errors).toHaveLength(2);
expect(errors[0].message).toContain('index 1');
expect(errors[0].message).toContain('Second Node');
expect(errors[1].message).toContain('index 2');
expect(errors[1].message).toContain('Third Node');
});
it('should handle duplicate IDs with same node type', () => {
// Edge case: Both nodes are the same type
const workflow = {
name: 'Test Workflow with Same Type Duplicates',
nodes: [
{
id: 'duplicate-slack',
name: 'Slack Send 1',
type: 'n8n-nodes-base.slack',
typeVersion: 2,
position: [250, 300],
parameters: {}
},
{
id: 'duplicate-slack',
name: 'Slack Send 2',
type: 'n8n-nodes-base.slack',
typeVersion: 2,
position: [450, 300],
parameters: {}
}
],
connections: {}
};
// Simulate validation logic
const nodeIds = new Set<string>();
const nodeIdToIndex = new Map<string, number>();
const errors: Array<{ message: string }> = [];
for (let i = 0; i < workflow.nodes.length; i++) {
const node = workflow.nodes[i];
if (nodeIds.has(node.id)) {
const firstNodeIndex = nodeIdToIndex.get(node.id);
const firstNode = firstNodeIndex !== undefined ? workflow.nodes[firstNodeIndex] : undefined;
errors.push({
message: `Duplicate node ID: "${node.id}". Node at index ${i} (name: "${node.name}", type: "${node.type}") conflicts with node at index ${firstNodeIndex} (name: "${firstNode?.name || 'unknown'}", type: "${firstNode?.type || 'unknown'}")`
});
} else {
nodeIds.add(node.id);
nodeIdToIndex.set(node.id, i);
}
}
expect(errors).toHaveLength(1);
expect(errors[0].message).toContain('Duplicate node ID: "duplicate-slack"');
expect(errors[0].message).toContain('Slack Send 2');
expect(errors[0].message).toContain('Slack Send 1');
// Both should show the same type
expect(errors[0].message).toMatch(/n8n-nodes-base\.slack.*n8n-nodes-base\.slack/s);
});
it('should handle duplicate IDs with empty node names gracefully', () => {
// Edge case: Empty string node names
const workflow = {
name: 'Test Workflow with Empty Names',
nodes: [
{
id: 'empty-name-id',
name: '',
type: 'n8n-nodes-base.httpRequest',
typeVersion: 3,
position: [250, 300],
parameters: {}
},
{
id: 'empty-name-id',
name: '',
type: 'n8n-nodes-base.set',
typeVersion: 2,
position: [450, 300],
parameters: {}
}
],
connections: {}
};
// Simulate validation logic with safe fallback
const nodeIds = new Set<string>();
const nodeIdToIndex = new Map<string, number>();
const errors: Array<{ message: string }> = [];
for (let i = 0; i < workflow.nodes.length; i++) {
const node = workflow.nodes[i];
if (nodeIds.has(node.id)) {
const firstNodeIndex = nodeIdToIndex.get(node.id);
const firstNode = firstNodeIndex !== undefined ? workflow.nodes[firstNodeIndex] : undefined;
errors.push({
message: `Duplicate node ID: "${node.id}". Node at index ${i} (name: "${node.name}", type: "${node.type}") conflicts with node at index ${firstNodeIndex} (name: "${firstNode?.name || 'unknown'}", type: "${firstNode?.type || 'unknown'}")`
});
} else {
nodeIds.add(node.id);
nodeIdToIndex.set(node.id, i);
}
}
// Should not crash and should use empty string in message
expect(errors).toHaveLength(1);
expect(errors[0].message).toContain('Duplicate node ID');
expect(errors[0].message).toContain('name: ""');
});
it('should handle duplicate IDs with missing node properties', () => {
// Edge case: Node with undefined type or name
const workflow = {
name: 'Test Workflow with Missing Properties',
nodes: [
{
id: 'missing-props',
name: 'Valid Node',
type: 'n8n-nodes-base.httpRequest',
typeVersion: 3,
position: [250, 300],
parameters: {}
},
{
id: 'missing-props',
name: undefined as any,
type: undefined as any,
typeVersion: 2,
position: [450, 300],
parameters: {}
}
],
connections: {}
};
// Simulate validation logic with safe fallbacks
const nodeIds = new Set<string>();
const nodeIdToIndex = new Map<string, number>();
const errors: Array<{ message: string }> = [];
for (let i = 0; i < workflow.nodes.length; i++) {
const node = workflow.nodes[i];
if (nodeIds.has(node.id)) {
const firstNodeIndex = nodeIdToIndex.get(node.id);
const firstNode = firstNodeIndex !== undefined ? workflow.nodes[firstNodeIndex] : undefined;
errors.push({
message: `Duplicate node ID: "${node.id}". Node at index ${i} (name: "${node.name}", type: "${node.type}") conflicts with node at index ${firstNodeIndex} (name: "${firstNode?.name || 'unknown'}", type: "${firstNode?.type || 'unknown'}")`
});
} else {
nodeIds.add(node.id);
nodeIdToIndex.set(node.id, i);
}
}
// Should use fallback values without crashing
expect(errors).toHaveLength(1);
expect(errors[0].message).toContain('Duplicate node ID: "missing-props"');
expect(errors[0].message).toContain('name: "undefined"');
expect(errors[0].message).toContain('type: "undefined"');
});
});
});

View File

@@ -1,817 +0,0 @@
/**
* Unit tests for MutationTracker - Sanitization and Processing
*/
import { describe, it, expect, beforeEach, vi } from 'vitest';
import { MutationTracker } from '../../../src/telemetry/mutation-tracker';
import { WorkflowMutationData, MutationToolName } from '../../../src/telemetry/mutation-types';
describe('MutationTracker', () => {
let tracker: MutationTracker;
beforeEach(() => {
tracker = new MutationTracker();
tracker.clearRecentMutations();
});
describe('Workflow Sanitization', () => {
it('should remove credentials from workflow level', async () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test sanitization',
operations: [{ type: 'updateNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [],
connections: {},
credentials: { apiKey: 'secret-key-123' },
sharedWorkflows: ['user1', 'user2'],
ownedBy: { id: 'user1', email: 'user@example.com' }
},
workflowAfter: {
id: 'wf1',
name: 'Test Updated',
nodes: [],
connections: {},
credentials: { apiKey: 'secret-key-456' }
},
mutationSuccess: true,
durationMs: 100
};
const result = await tracker.processMutation(data, 'test-user');
expect(result).toBeTruthy();
expect(result!.workflowBefore).toBeDefined();
expect(result!.workflowBefore.credentials).toBeUndefined();
expect(result!.workflowBefore.sharedWorkflows).toBeUndefined();
expect(result!.workflowBefore.ownedBy).toBeUndefined();
expect(result!.workflowAfter.credentials).toBeUndefined();
});
it('should remove credentials from node level', async () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test node credentials',
operations: [{ type: 'addNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [
{
id: 'node1',
name: 'HTTP Request',
type: 'n8n-nodes-base.httpRequest',
position: [100, 100],
credentials: {
httpBasicAuth: {
id: 'cred-123',
name: 'My Auth'
}
},
parameters: {
url: 'https://api.example.com'
}
}
],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test',
nodes: [
{
id: 'node1',
name: 'HTTP Request',
type: 'n8n-nodes-base.httpRequest',
position: [100, 100],
credentials: {
httpBasicAuth: {
id: 'cred-456',
name: 'Updated Auth'
}
},
parameters: {
url: 'https://api.example.com'
}
}
],
connections: {}
},
mutationSuccess: true,
durationMs: 150
};
const result = await tracker.processMutation(data, 'test-user');
expect(result).toBeTruthy();
expect(result!.workflowBefore.nodes[0].credentials).toBeUndefined();
expect(result!.workflowAfter.nodes[0].credentials).toBeUndefined();
});
it('should redact API keys in parameters', async () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test API key redaction',
operations: [{ type: 'updateNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [
{
id: 'node1',
name: 'OpenAI',
type: 'n8n-nodes-base.openAi',
position: [100, 100],
parameters: {
apiKeyField: 'sk-1234567890abcdef1234567890abcdef',
tokenField: 'Bearer abc123def456',
config: {
passwordField: 'secret-password-123'
}
}
}
],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test',
nodes: [
{
id: 'node1',
name: 'OpenAI',
type: 'n8n-nodes-base.openAi',
position: [100, 100],
parameters: {
apiKeyField: 'sk-newkey567890abcdef1234567890abcdef'
}
}
],
connections: {}
},
mutationSuccess: true,
durationMs: 200
};
const result = await tracker.processMutation(data, 'test-user');
expect(result).toBeTruthy();
const params = result!.workflowBefore.nodes[0].parameters;
// Fields with sensitive key names are redacted
expect(params.apiKeyField).toBe('[REDACTED]');
expect(params.tokenField).toBe('[REDACTED]');
expect(params.config.passwordField).toBe('[REDACTED]');
});
it('should redact URLs with authentication', async () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test URL redaction',
operations: [{ type: 'updateNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [
{
id: 'node1',
name: 'HTTP Request',
type: 'n8n-nodes-base.httpRequest',
position: [100, 100],
parameters: {
url: 'https://user:password@api.example.com/endpoint',
webhookUrl: 'http://admin:secret@webhook.example.com'
}
}
],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
const result = await tracker.processMutation(data, 'test-user');
expect(result).toBeTruthy();
const params = result!.workflowBefore.nodes[0].parameters;
// URL auth is redacted but path is preserved
expect(params.url).toBe('[REDACTED_URL_WITH_AUTH]/endpoint');
expect(params.webhookUrl).toBe('[REDACTED_URL_WITH_AUTH]');
});
it('should redact long tokens (32+ characters)', async () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test token redaction',
operations: [{ type: 'updateNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [
{
id: 'node1',
name: 'Slack',
type: 'n8n-nodes-base.slack',
position: [100, 100],
parameters: {
message: 'Token: test-token-1234567890-1234567890123-abcdefghijklmnopqrstuvwx'
}
}
],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
const result = await tracker.processMutation(data, 'test-user');
expect(result).toBeTruthy();
const message = result!.workflowBefore.nodes[0].parameters.message;
expect(message).toContain('[REDACTED_TOKEN]');
});
it('should redact OpenAI-style keys', async () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test OpenAI key redaction',
operations: [{ type: 'updateNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [
{
id: 'node1',
name: 'Code',
type: 'n8n-nodes-base.code',
position: [100, 100],
parameters: {
code: 'const apiKey = "sk-proj-abcd1234efgh5678ijkl9012mnop3456";'
}
}
],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
const result = await tracker.processMutation(data, 'test-user');
expect(result).toBeTruthy();
const code = result!.workflowBefore.nodes[0].parameters.code;
// The 32+ char regex runs before OpenAI-specific regex, so it becomes [REDACTED_TOKEN]
expect(code).toContain('[REDACTED_TOKEN]');
});
it('should redact Bearer tokens', async () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test Bearer token redaction',
operations: [{ type: 'updateNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [
{
id: 'node1',
name: 'HTTP Request',
type: 'n8n-nodes-base.httpRequest',
position: [100, 100],
parameters: {
headerParameters: {
parameter: [
{
name: 'Authorization',
value: 'Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c'
}
]
}
}
}
],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
const result = await tracker.processMutation(data, 'test-user');
expect(result).toBeTruthy();
const authValue = result!.workflowBefore.nodes[0].parameters.headerParameters.parameter[0].value;
expect(authValue).toBe('Bearer [REDACTED]');
});
it('should preserve workflow structure while sanitizing', async () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test structure preservation',
operations: [{ type: 'addNode' }],
workflowBefore: {
id: 'wf1',
name: 'My Workflow',
nodes: [
{
id: 'node1',
name: 'Start',
type: 'n8n-nodes-base.start',
position: [100, 100],
parameters: {}
},
{
id: 'node2',
name: 'HTTP',
type: 'n8n-nodes-base.httpRequest',
position: [300, 100],
parameters: {
url: 'https://api.example.com',
apiKey: 'secret-key'
}
}
],
connections: {
Start: {
main: [[{ node: 'HTTP', type: 'main', index: 0 }]]
}
},
active: true,
credentials: { apiKey: 'workflow-secret' }
},
workflowAfter: {
id: 'wf1',
name: 'My Workflow',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 150
};
const result = await tracker.processMutation(data, 'test-user');
expect(result).toBeTruthy();
// Check structure preserved
expect(result!.workflowBefore.id).toBe('wf1');
expect(result!.workflowBefore.name).toBe('My Workflow');
expect(result!.workflowBefore.nodes).toHaveLength(2);
expect(result!.workflowBefore.connections).toBeDefined();
expect(result!.workflowBefore.active).toBe(true);
// Check credentials removed
expect(result!.workflowBefore.credentials).toBeUndefined();
// Check node parameters sanitized
expect(result!.workflowBefore.nodes[1].parameters.apiKey).toBe('[REDACTED]');
// Check connections preserved
expect(result!.workflowBefore.connections.Start).toBeDefined();
});
it('should handle nested objects recursively', async () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test nested sanitization',
operations: [{ type: 'updateNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [
{
id: 'node1',
name: 'Complex Node',
type: 'n8n-nodes-base.httpRequest',
position: [100, 100],
parameters: {
authentication: {
type: 'oauth2',
// Use 'settings' instead of 'credentials' since 'credentials' is a sensitive key
settings: {
clientId: 'safe-client-id',
clientSecret: 'very-secret-key',
nested: {
apiKeyValue: 'deep-secret-key',
tokenValue: 'nested-token'
}
}
}
}
}
],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
const result = await tracker.processMutation(data, 'test-user');
expect(result).toBeTruthy();
const auth = result!.workflowBefore.nodes[0].parameters.authentication;
// The key 'authentication' contains 'auth' which is sensitive, so entire object is redacted
expect(auth).toBe('[REDACTED]');
});
});
describe('Deduplication', () => {
it('should detect and skip duplicate mutations', async () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'First mutation',
operations: [{ type: 'updateNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test Updated',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
// First mutation should succeed
const result1 = await tracker.processMutation(data, 'test-user');
expect(result1).toBeTruthy();
// Exact duplicate should be skipped
const result2 = await tracker.processMutation(data, 'test-user');
expect(result2).toBeNull();
});
it('should allow mutations with different workflows', async () => {
const data1: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'First mutation',
operations: [{ type: 'updateNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test 1',
nodes: [],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test 1 Updated',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
const data2: WorkflowMutationData = {
...data1,
workflowBefore: {
id: 'wf2',
name: 'Test 2',
nodes: [],
connections: {}
},
workflowAfter: {
id: 'wf2',
name: 'Test 2 Updated',
nodes: [],
connections: {}
}
};
const result1 = await tracker.processMutation(data1, 'test-user');
const result2 = await tracker.processMutation(data2, 'test-user');
expect(result1).toBeTruthy();
expect(result2).toBeTruthy();
});
});
describe('Structural Hash Generation', () => {
it('should generate structural hashes for both before and after workflows', async () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test structural hash generation',
operations: [{ type: 'addNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [
{
id: 'node1',
name: 'Start',
type: 'n8n-nodes-base.start',
position: [100, 100],
parameters: {}
}
],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test',
nodes: [
{
id: 'node1',
name: 'Start',
type: 'n8n-nodes-base.start',
position: [100, 100],
parameters: {}
},
{
id: 'node2',
name: 'HTTP',
type: 'n8n-nodes-base.httpRequest',
position: [300, 100],
parameters: { url: 'https://api.example.com' }
}
],
connections: {
Start: {
main: [[{ node: 'HTTP', type: 'main', index: 0 }]]
}
}
},
mutationSuccess: true,
durationMs: 100
};
const result = await tracker.processMutation(data, 'test-user');
expect(result).toBeTruthy();
expect(result!.workflowStructureHashBefore).toBeDefined();
expect(result!.workflowStructureHashAfter).toBeDefined();
expect(typeof result!.workflowStructureHashBefore).toBe('string');
expect(typeof result!.workflowStructureHashAfter).toBe('string');
expect(result!.workflowStructureHashBefore!.length).toBe(16);
expect(result!.workflowStructureHashAfter!.length).toBe(16);
});
it('should generate different structural hashes when node types change', async () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test hash changes with node types',
operations: [{ type: 'addNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [
{
id: 'node1',
name: 'Start',
type: 'n8n-nodes-base.start',
position: [100, 100],
parameters: {}
}
],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test',
nodes: [
{
id: 'node1',
name: 'Start',
type: 'n8n-nodes-base.start',
position: [100, 100],
parameters: {}
},
{
id: 'node2',
name: 'Slack',
type: 'n8n-nodes-base.slack',
position: [300, 100],
parameters: {}
}
],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
const result = await tracker.processMutation(data, 'test-user');
expect(result).toBeTruthy();
expect(result!.workflowStructureHashBefore).not.toBe(result!.workflowStructureHashAfter);
});
it('should generate same structural hash for workflows with same structure but different parameters', async () => {
const workflow1Before = {
id: 'wf1',
name: 'Test 1',
nodes: [
{
id: 'node1',
name: 'HTTP',
type: 'n8n-nodes-base.httpRequest',
position: [100, 100],
parameters: { url: 'https://api1.example.com' }
}
],
connections: {}
};
const workflow1After = {
id: 'wf1',
name: 'Test 1 Updated',
nodes: [
{
id: 'node1',
name: 'HTTP',
type: 'n8n-nodes-base.httpRequest',
position: [100, 100],
parameters: { url: 'https://api1-updated.example.com' }
}
],
connections: {}
};
const workflow2Before = {
id: 'wf2',
name: 'Test 2',
nodes: [
{
id: 'node2',
name: 'Different Name',
type: 'n8n-nodes-base.httpRequest',
position: [200, 200],
parameters: { url: 'https://api2.example.com' }
}
],
connections: {}
};
const workflow2After = {
id: 'wf2',
name: 'Test 2 Updated',
nodes: [
{
id: 'node2',
name: 'Different Name',
type: 'n8n-nodes-base.httpRequest',
position: [200, 200],
parameters: { url: 'https://api2-updated.example.com' }
}
],
connections: {}
};
const data1: WorkflowMutationData = {
sessionId: 'test-session-1',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test 1',
operations: [{ type: 'updateNode', nodeId: 'node1', updates: { 'parameters.test': 'value1' } } as any],
workflowBefore: workflow1Before,
workflowAfter: workflow1After,
mutationSuccess: true,
durationMs: 100
};
const data2: WorkflowMutationData = {
sessionId: 'test-session-2',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test 2',
operations: [{ type: 'updateNode', nodeId: 'node2', updates: { 'parameters.test': 'value2' } } as any],
workflowBefore: workflow2Before,
workflowAfter: workflow2After,
mutationSuccess: true,
durationMs: 100
};
const result1 = await tracker.processMutation(data1, 'test-user-1');
const result2 = await tracker.processMutation(data2, 'test-user-2');
expect(result1).toBeTruthy();
expect(result2).toBeTruthy();
// Same structure (same node types, same connection structure) should yield same hash
expect(result1!.workflowStructureHashBefore).toBe(result2!.workflowStructureHashBefore);
});
it('should generate both full hash and structural hash', async () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test both hash types',
operations: [{ type: 'updateNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test Updated',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
const result = await tracker.processMutation(data, 'test-user');
expect(result).toBeTruthy();
// Full hashes (includes all workflow data)
expect(result!.workflowHashBefore).toBeDefined();
expect(result!.workflowHashAfter).toBeDefined();
// Structural hashes (nodeTypes + connections only)
expect(result!.workflowStructureHashBefore).toBeDefined();
expect(result!.workflowStructureHashAfter).toBeDefined();
// They should be different since they hash different data
expect(result!.workflowHashBefore).not.toBe(result!.workflowStructureHashBefore);
});
});
describe('Statistics', () => {
it('should track recent mutations count', async () => {
expect(tracker.getRecentMutationsCount()).toBe(0);
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test counting',
operations: [{ type: 'updateNode' }],
workflowBefore: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
workflowAfter: { id: 'wf1', name: 'Test Updated', nodes: [], connections: {} },
mutationSuccess: true,
durationMs: 100
};
await tracker.processMutation(data, 'test-user');
expect(tracker.getRecentMutationsCount()).toBe(1);
// Process another with different workflow
const data2 = { ...data, workflowBefore: { ...data.workflowBefore, id: 'wf2' } };
await tracker.processMutation(data2, 'test-user');
expect(tracker.getRecentMutationsCount()).toBe(2);
});
it('should clear recent mutations', async () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test clearing',
operations: [{ type: 'updateNode' }],
workflowBefore: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
workflowAfter: { id: 'wf1', name: 'Test Updated', nodes: [], connections: {} },
mutationSuccess: true,
durationMs: 100
};
await tracker.processMutation(data, 'test-user');
expect(tracker.getRecentMutationsCount()).toBe(1);
tracker.clearRecentMutations();
expect(tracker.getRecentMutationsCount()).toBe(0);
});
});
});

View File

@@ -1,557 +0,0 @@
/**
* Unit tests for MutationValidator - Data Quality Validation
*/
import { describe, it, expect, beforeEach } from 'vitest';
import { MutationValidator } from '../../../src/telemetry/mutation-validator';
import { WorkflowMutationData, MutationToolName } from '../../../src/telemetry/mutation-types';
import type { UpdateNodeOperation } from '../../../src/types/workflow-diff';
describe('MutationValidator', () => {
let validator: MutationValidator;
beforeEach(() => {
validator = new MutationValidator();
});
describe('Workflow Structure Validation', () => {
it('should accept valid workflow structure', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Valid mutation',
operations: [{ type: 'updateNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test Updated',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
const result = validator.validate(data);
expect(result.valid).toBe(true);
expect(result.errors).toHaveLength(0);
});
it('should reject workflow without nodes array', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Invalid mutation',
operations: [{ type: 'updateNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
connections: {}
} as any,
workflowAfter: {
id: 'wf1',
name: 'Test',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
const result = validator.validate(data);
expect(result.valid).toBe(false);
expect(result.errors).toContain('Invalid workflow_before structure');
});
it('should reject workflow without connections object', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Invalid mutation',
operations: [{ type: 'updateNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: []
} as any,
workflowAfter: {
id: 'wf1',
name: 'Test',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
const result = validator.validate(data);
expect(result.valid).toBe(false);
expect(result.errors).toContain('Invalid workflow_before structure');
});
it('should reject null workflow', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Invalid mutation',
operations: [{ type: 'updateNode' }],
workflowBefore: null as any,
workflowAfter: {
id: 'wf1',
name: 'Test',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
const result = validator.validate(data);
expect(result.valid).toBe(false);
expect(result.errors).toContain('Invalid workflow_before structure');
});
});
describe('Workflow Size Validation', () => {
it('should accept workflows within size limit', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Size test',
operations: [{ type: 'addNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [{
id: 'node1',
name: 'Start',
type: 'n8n-nodes-base.start',
position: [100, 100],
parameters: {}
}],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
const result = validator.validate(data);
expect(result.valid).toBe(true);
expect(result.errors).not.toContain(expect.stringContaining('size'));
});
it('should reject oversized workflows', () => {
// Create a very large workflow (over 500KB default limit)
// 600KB string = 600,000 characters
const largeArray = new Array(600000).fill('x').join('');
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Oversized test',
operations: [{ type: 'updateNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [{
id: 'node1',
name: 'Large',
type: 'n8n-nodes-base.code',
position: [100, 100],
parameters: {
code: largeArray
}
}],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
const result = validator.validate(data);
expect(result.valid).toBe(false);
expect(result.errors.some(err => err.includes('size') && err.includes('exceeds'))).toBe(true);
});
it('should respect custom size limit', () => {
const customValidator = new MutationValidator({ maxWorkflowSizeKb: 1 });
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Custom size test',
operations: [{ type: 'addNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [{
id: 'node1',
name: 'Medium',
type: 'n8n-nodes-base.code',
position: [100, 100],
parameters: {
code: 'x'.repeat(2000) // ~2KB
}
}],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
const result = customValidator.validate(data);
expect(result.valid).toBe(false);
expect(result.errors.some(err => err.includes('exceeds maximum (1KB)'))).toBe(true);
});
});
describe('Intent Validation', () => {
it('should warn about empty intent', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: '',
operations: [{ type: 'updateNode' }],
workflowBefore: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
workflowAfter: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
mutationSuccess: true,
durationMs: 100
};
const result = validator.validate(data);
expect(result.warnings).toContain('User intent is empty');
});
it('should warn about very short intent', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'fix',
operations: [{ type: 'updateNode' }],
workflowBefore: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
workflowAfter: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
mutationSuccess: true,
durationMs: 100
};
const result = validator.validate(data);
expect(result.warnings).toContain('User intent is too short (less than 5 characters)');
});
it('should warn about very long intent', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'x'.repeat(1001),
operations: [{ type: 'updateNode' }],
workflowBefore: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
workflowAfter: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
mutationSuccess: true,
durationMs: 100
};
const result = validator.validate(data);
expect(result.warnings).toContain('User intent is very long (over 1000 characters)');
});
it('should accept good intent length', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Add error handling to API nodes',
operations: [{ type: 'updateNode' }],
workflowBefore: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
workflowAfter: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
mutationSuccess: true,
durationMs: 100
};
const result = validator.validate(data);
expect(result.warnings).not.toContain(expect.stringContaining('intent'));
});
});
describe('Operations Validation', () => {
it('should reject empty operations array', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test',
operations: [],
workflowBefore: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
workflowAfter: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
mutationSuccess: true,
durationMs: 100
};
const result = validator.validate(data);
expect(result.valid).toBe(false);
expect(result.errors).toContain('No operations provided');
});
it('should accept operations array with items', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test',
operations: [
{ type: 'addNode' },
{ type: 'addConnection' }
],
workflowBefore: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
workflowAfter: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
mutationSuccess: true,
durationMs: 100
};
const result = validator.validate(data);
expect(result.valid).toBe(true);
expect(result.errors).not.toContain('No operations provided');
});
});
describe('Duration Validation', () => {
it('should reject negative duration', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test',
operations: [{ type: 'updateNode' }],
workflowBefore: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
workflowAfter: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
mutationSuccess: true,
durationMs: -100
};
const result = validator.validate(data);
expect(result.valid).toBe(false);
expect(result.errors).toContain('Duration cannot be negative');
});
it('should warn about very long duration', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test',
operations: [{ type: 'updateNode' }],
workflowBefore: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
workflowAfter: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
mutationSuccess: true,
durationMs: 400000 // Over 5 minutes
};
const result = validator.validate(data);
expect(result.warnings).toContain('Duration is very long (over 5 minutes)');
});
it('should accept reasonable duration', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test',
operations: [{ type: 'updateNode' }],
workflowBefore: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
workflowAfter: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
mutationSuccess: true,
durationMs: 150
};
const result = validator.validate(data);
expect(result.valid).toBe(true);
expect(result.warnings).not.toContain(expect.stringContaining('Duration'));
});
});
describe('Meaningful Change Detection', () => {
it('should warn when workflows are identical', () => {
const workflow = {
id: 'wf1',
name: 'Test',
nodes: [
{
id: 'node1',
name: 'Start',
type: 'n8n-nodes-base.start',
position: [100, 100],
parameters: {}
}
],
connections: {}
};
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'No actual change',
operations: [{ type: 'updateNode' }],
workflowBefore: workflow,
workflowAfter: JSON.parse(JSON.stringify(workflow)), // Deep clone
mutationSuccess: true,
durationMs: 100
};
const result = validator.validate(data);
expect(result.warnings).toContain('No meaningful change detected between before and after workflows');
});
it('should not warn when workflows are different', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Real change',
operations: [{ type: 'updateNode' }],
workflowBefore: {
id: 'wf1',
name: 'Test',
nodes: [],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'Test Updated',
nodes: [],
connections: {}
},
mutationSuccess: true,
durationMs: 100
};
const result = validator.validate(data);
expect(result.warnings).not.toContain(expect.stringContaining('meaningful change'));
});
});
describe('Validation Data Consistency', () => {
it('should warn about invalid validation structure', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test',
operations: [{ type: 'updateNode' }],
workflowBefore: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
workflowAfter: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
validationBefore: { valid: 'yes' } as any, // Invalid structure
validationAfter: { valid: true, errors: [] },
mutationSuccess: true,
durationMs: 100
};
const result = validator.validate(data);
expect(result.warnings).toContain('Invalid validation_before structure');
});
it('should accept valid validation structure', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Test',
operations: [{ type: 'updateNode' }],
workflowBefore: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
workflowAfter: { id: 'wf1', name: 'Test', nodes: [], connections: {} },
validationBefore: { valid: false, errors: [{ type: 'test_error', message: 'Error 1' }] },
validationAfter: { valid: true, errors: [] },
mutationSuccess: true,
durationMs: 100
};
const result = validator.validate(data);
expect(result.warnings).not.toContain(expect.stringContaining('validation'));
});
});
describe('Comprehensive Validation', () => {
it('should collect multiple errors and warnings', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: '', // Empty - warning
operations: [], // Empty - error
workflowBefore: null as any, // Invalid - error
workflowAfter: { nodes: [] } as any, // Missing connections - error
mutationSuccess: true,
durationMs: -50 // Negative - error
};
const result = validator.validate(data);
expect(result.valid).toBe(false);
expect(result.errors.length).toBeGreaterThan(0);
expect(result.warnings.length).toBeGreaterThan(0);
});
it('should pass validation with all criteria met', () => {
const data: WorkflowMutationData = {
sessionId: 'test-session-123',
toolName: MutationToolName.UPDATE_PARTIAL,
userIntent: 'Add error handling to HTTP Request nodes',
operations: [
{ type: 'updateNode', nodeName: 'node1', updates: { onError: 'continueErrorOutput' } } as UpdateNodeOperation
],
workflowBefore: {
id: 'wf1',
name: 'API Workflow',
nodes: [
{
id: 'node1',
name: 'HTTP Request',
type: 'n8n-nodes-base.httpRequest',
position: [300, 200],
parameters: {
url: 'https://api.example.com',
method: 'GET'
}
}
],
connections: {}
},
workflowAfter: {
id: 'wf1',
name: 'API Workflow',
nodes: [
{
id: 'node1',
name: 'HTTP Request',
type: 'n8n-nodes-base.httpRequest',
position: [300, 200],
parameters: {
url: 'https://api.example.com',
method: 'GET'
},
onError: 'continueErrorOutput'
}
],
connections: {}
},
validationBefore: { valid: true, errors: [] },
validationAfter: { valid: true, errors: [] },
mutationSuccess: true,
durationMs: 245
};
const result = validator.validate(data);
expect(result.valid).toBe(true);
expect(result.errors).toHaveLength(0);
});
});
});

View File

@@ -70,18 +70,13 @@ describe('TelemetryManager', () => {
updateToolSequence: vi.fn(),
getEventQueue: vi.fn().mockReturnValue([]),
getWorkflowQueue: vi.fn().mockReturnValue([]),
getMutationQueue: vi.fn().mockReturnValue([]),
clearEventQueue: vi.fn(),
clearWorkflowQueue: vi.fn(),
clearMutationQueue: vi.fn(),
enqueueMutation: vi.fn(),
getMutationQueueSize: vi.fn().mockReturnValue(0),
getStats: vi.fn().mockReturnValue({
rateLimiter: { currentEvents: 0, droppedEvents: 0 },
validator: { successes: 0, errors: 0 },
eventQueueSize: 0,
workflowQueueSize: 0,
mutationQueueSize: 0,
performanceMetrics: {}
})
};
@@ -322,21 +317,17 @@ describe('TelemetryManager', () => {
it('should flush events and workflows', async () => {
const mockEvents = [{ user_id: 'user1', event: 'test', properties: {} }];
const mockWorkflows = [{ user_id: 'user1', workflow_hash: 'hash1' }];
const mockMutations: any[] = [];
mockEventTracker.getEventQueue.mockReturnValue(mockEvents);
mockEventTracker.getWorkflowQueue.mockReturnValue(mockWorkflows);
mockEventTracker.getMutationQueue.mockReturnValue(mockMutations);
await manager.flush();
expect(mockEventTracker.getEventQueue).toHaveBeenCalled();
expect(mockEventTracker.getWorkflowQueue).toHaveBeenCalled();
expect(mockEventTracker.getMutationQueue).toHaveBeenCalled();
expect(mockEventTracker.clearEventQueue).toHaveBeenCalled();
expect(mockEventTracker.clearWorkflowQueue).toHaveBeenCalled();
expect(mockEventTracker.clearMutationQueue).toHaveBeenCalled();
expect(mockBatchProcessor.flush).toHaveBeenCalledWith(mockEvents, mockWorkflows, mockMutations);
expect(mockBatchProcessor.flush).toHaveBeenCalledWith(mockEvents, mockWorkflows);
});
it('should not flush when disabled', async () => {

View File

@@ -49,7 +49,7 @@ describe('WorkflowSanitizer', () => {
const sanitized = WorkflowSanitizer.sanitizeWorkflow(workflow);
expect(sanitized.nodes[0].parameters.webhookUrl).toBe('https://[webhook-url]');
expect(sanitized.nodes[0].parameters.webhookUrl).toBe('[REDACTED]');
expect(sanitized.nodes[0].parameters.method).toBe('POST'); // Method should remain
expect(sanitized.nodes[0].parameters.path).toBe('my-webhook'); // Path should remain
});
@@ -104,9 +104,9 @@ describe('WorkflowSanitizer', () => {
const sanitized = WorkflowSanitizer.sanitizeWorkflow(workflow);
expect(sanitized.nodes[0].parameters.url).toBe('https://[domain]/endpoint');
expect(sanitized.nodes[0].parameters.endpoint).toBe('https://[domain]/api');
expect(sanitized.nodes[0].parameters.baseUrl).toBe('https://[domain]');
expect(sanitized.nodes[0].parameters.url).toBe('[REDACTED]');
expect(sanitized.nodes[0].parameters.endpoint).toBe('[REDACTED]');
expect(sanitized.nodes[0].parameters.baseUrl).toBe('[REDACTED]');
});
it('should calculate workflow metrics correctly', () => {
@@ -480,8 +480,8 @@ describe('WorkflowSanitizer', () => {
expect(params.secret_token).toBe('[REDACTED]');
expect(params.authKey).toBe('[REDACTED]');
expect(params.clientSecret).toBe('[REDACTED]');
expect(params.webhookUrl).toBe('https://hooks.example.com/services/T00000000/B00000000/[REDACTED]');
expect(params.databaseUrl).toBe('[REDACTED_URL_WITH_AUTH]');
expect(params.webhookUrl).toBe('[REDACTED]');
expect(params.databaseUrl).toBe('[REDACTED]');
expect(params.connectionString).toBe('[REDACTED]');
// Safe values should remain
@@ -515,9 +515,9 @@ describe('WorkflowSanitizer', () => {
const sanitized = WorkflowSanitizer.sanitizeWorkflow(workflow);
const headers = sanitized.nodes[0].parameters.headers;
expect(headers[0].value).toBe('Bearer [REDACTED]'); // Authorization (Bearer prefix preserved)
expect(headers[0].value).toBe('[REDACTED]'); // Authorization
expect(headers[1].value).toBe('application/json'); // Content-Type (safe)
expect(headers[2].value).toBe('[REDACTED_TOKEN]'); // X-API-Key (32+ chars)
expect(headers[2].value).toBe('[REDACTED]'); // X-API-Key
expect(sanitized.nodes[0].parameters.methods).toEqual(['GET', 'POST']); // Array should remain
});

View File

@@ -1,229 +0,0 @@
/**
* Tests for Type Structure type definitions
*
* @group unit
* @group types
*/
import { describe, it, expect } from 'vitest';
import {
isComplexType,
isPrimitiveType,
isTypeStructure,
type TypeStructure,
type ComplexPropertyType,
type PrimitivePropertyType,
} from '@/types/type-structures';
import type { NodePropertyTypes } from 'n8n-workflow';
describe('Type Guards', () => {
describe('isComplexType', () => {
it('should identify complex types correctly', () => {
const complexTypes: NodePropertyTypes[] = [
'collection',
'fixedCollection',
'resourceLocator',
'resourceMapper',
'filter',
'assignmentCollection',
];
for (const type of complexTypes) {
expect(isComplexType(type)).toBe(true);
}
});
it('should return false for non-complex types', () => {
const nonComplexTypes: NodePropertyTypes[] = [
'string',
'number',
'boolean',
'options',
'multiOptions',
];
for (const type of nonComplexTypes) {
expect(isComplexType(type)).toBe(false);
}
});
});
describe('isPrimitiveType', () => {
it('should identify primitive types correctly', () => {
const primitiveTypes: NodePropertyTypes[] = [
'string',
'number',
'boolean',
'dateTime',
'color',
'json',
];
for (const type of primitiveTypes) {
expect(isPrimitiveType(type)).toBe(true);
}
});
it('should return false for non-primitive types', () => {
const nonPrimitiveTypes: NodePropertyTypes[] = [
'collection',
'fixedCollection',
'options',
'multiOptions',
'filter',
];
for (const type of nonPrimitiveTypes) {
expect(isPrimitiveType(type)).toBe(false);
}
});
});
describe('isTypeStructure', () => {
it('should validate correct TypeStructure objects', () => {
const validStructure: TypeStructure = {
type: 'primitive',
jsType: 'string',
description: 'A test type',
example: 'test',
};
expect(isTypeStructure(validStructure)).toBe(true);
});
it('should reject objects missing required fields', () => {
const invalidStructures = [
{ jsType: 'string', description: 'test', example: 'test' }, // Missing type
{ type: 'primitive', description: 'test', example: 'test' }, // Missing jsType
{ type: 'primitive', jsType: 'string', example: 'test' }, // Missing description
{ type: 'primitive', jsType: 'string', description: 'test' }, // Missing example
];
for (const invalid of invalidStructures) {
expect(isTypeStructure(invalid)).toBe(false);
}
});
it('should reject objects with invalid type values', () => {
const invalidType = {
type: 'invalid',
jsType: 'string',
description: 'test',
example: 'test',
};
expect(isTypeStructure(invalidType)).toBe(false);
});
it('should reject objects with invalid jsType values', () => {
const invalidJsType = {
type: 'primitive',
jsType: 'invalid',
description: 'test',
example: 'test',
};
expect(isTypeStructure(invalidJsType)).toBe(false);
});
it('should reject non-object values', () => {
expect(isTypeStructure(null)).toBe(false);
expect(isTypeStructure(undefined)).toBe(false);
expect(isTypeStructure('string')).toBe(false);
expect(isTypeStructure(123)).toBe(false);
expect(isTypeStructure([])).toBe(false);
});
});
});
describe('TypeStructure Interface', () => {
it('should allow all valid type categories', () => {
const types: Array<TypeStructure['type']> = [
'primitive',
'object',
'array',
'collection',
'special',
];
// This test just verifies TypeScript compilation
expect(types.length).toBe(5);
});
it('should allow all valid jsType values', () => {
const jsTypes: Array<TypeStructure['jsType']> = [
'string',
'number',
'boolean',
'object',
'array',
'any',
];
// This test just verifies TypeScript compilation
expect(jsTypes.length).toBe(6);
});
it('should support optional properties', () => {
const minimal: TypeStructure = {
type: 'primitive',
jsType: 'string',
description: 'Test',
example: 'test',
};
const full: TypeStructure = {
type: 'primitive',
jsType: 'string',
description: 'Test',
example: 'test',
examples: ['test1', 'test2'],
structure: {
properties: {
field: {
type: 'string',
description: 'A field',
},
},
},
validation: {
allowEmpty: true,
allowExpressions: true,
pattern: '^test',
},
introducedIn: '1.0.0',
notes: ['Note 1', 'Note 2'],
};
expect(minimal).toBeDefined();
expect(full).toBeDefined();
});
});
describe('Type Unions', () => {
it('should correctly type ComplexPropertyType', () => {
const complexTypes: ComplexPropertyType[] = [
'collection',
'fixedCollection',
'resourceLocator',
'resourceMapper',
'filter',
'assignmentCollection',
];
expect(complexTypes.length).toBe(6);
});
it('should correctly type PrimitivePropertyType', () => {
const primitiveTypes: PrimitivePropertyType[] = [
'string',
'number',
'boolean',
'dateTime',
'color',
'json',
];
expect(primitiveTypes.length).toBe(6);
});
});

132
verify-telemetry-fix.js Normal file
View File

@@ -0,0 +1,132 @@
#!/usr/bin/env node
/**
* Verification script to test that telemetry permissions are fixed
* Run this AFTER applying the GRANT permissions fix
*/
const { createClient } = require('@supabase/supabase-js');
const crypto = require('crypto');
const TELEMETRY_BACKEND = {
URL: 'https://ydyufsohxdfpopqbubwk.supabase.co',
ANON_KEY: 'eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJzdXBhYmFzZSIsInJlZiI6InlkeXVmc29oeGRmcG9wcWJ1YndrIiwicm9sZSI6ImFub24iLCJpYXQiOjE3NTg3OTYyMDAsImV4cCI6MjA3NDM3MjIwMH0.xESphg6h5ozaDsm4Vla3QnDJGc6Nc_cpfoqTHRynkCk'
};
async function verifyTelemetryFix() {
console.log('🔍 VERIFYING TELEMETRY PERMISSIONS FIX');
console.log('====================================\n');
const supabase = createClient(TELEMETRY_BACKEND.URL, TELEMETRY_BACKEND.ANON_KEY, {
auth: {
persistSession: false,
autoRefreshToken: false,
}
});
const testUserId = 'verify-' + crypto.randomBytes(4).toString('hex');
// Test 1: Event insert
console.log('📝 Test 1: Event insert');
try {
const { data, error } = await supabase
.from('telemetry_events')
.insert([{
user_id: testUserId,
event: 'verification_test',
properties: { fixed: true }
}]);
if (error) {
console.error('❌ Event insert failed:', error.message);
return false;
} else {
console.log('✅ Event insert successful');
}
} catch (e) {
console.error('❌ Event insert exception:', e.message);
return false;
}
// Test 2: Workflow insert
console.log('📝 Test 2: Workflow insert');
try {
const { data, error } = await supabase
.from('telemetry_workflows')
.insert([{
user_id: testUserId,
workflow_hash: 'verify-' + crypto.randomBytes(4).toString('hex'),
node_count: 2,
node_types: ['n8n-nodes-base.webhook', 'n8n-nodes-base.set'],
has_trigger: true,
has_webhook: true,
complexity: 'simple',
sanitized_workflow: {
nodes: [{
id: 'test-node',
type: 'n8n-nodes-base.webhook',
position: [100, 100],
parameters: {}
}],
connections: {}
}
}]);
if (error) {
console.error('❌ Workflow insert failed:', error.message);
return false;
} else {
console.log('✅ Workflow insert successful');
}
} catch (e) {
console.error('❌ Workflow insert exception:', e.message);
return false;
}
// Test 3: Upsert operation (like real telemetry)
console.log('📝 Test 3: Upsert operation');
try {
const workflowHash = 'upsert-verify-' + crypto.randomBytes(4).toString('hex');
const { data, error } = await supabase
.from('telemetry_workflows')
.upsert([{
user_id: testUserId,
workflow_hash: workflowHash,
node_count: 3,
node_types: ['n8n-nodes-base.webhook', 'n8n-nodes-base.set', 'n8n-nodes-base.if'],
has_trigger: true,
has_webhook: true,
complexity: 'medium',
sanitized_workflow: {
nodes: [],
connections: {}
}
}], {
onConflict: 'workflow_hash',
ignoreDuplicates: true,
});
if (error) {
console.error('❌ Upsert failed:', error.message);
return false;
} else {
console.log('✅ Upsert successful');
}
} catch (e) {
console.error('❌ Upsert exception:', e.message);
return false;
}
console.log('\n🎉 All tests passed! Telemetry permissions are fixed.');
console.log('👍 Workflow telemetry should now work in the actual application.');
return true;
}
async function main() {
const success = await verifyTelemetryFix();
process.exit(success ? 0 : 1);
}
main().catch(console.error);